Multiple vulnerabilities have been reported for various Oracle products. Some vulnerabilities have unknown impacts while others can be exploited by malicious users to bypass certain security restrictions, conduct SQL injection attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
1) Two boundary errors exist in the XDB.XDB_PITRIG_PKG.PITRIG_TRUNCATE and XDB.XDB_PITRIG_PKG.PITRIG_DROP procedures. These can be exploited to cause buffer overflows via overly long arguments passed to the affected procedures.
2) Input passed via the first argument to the XDB.XDB_PITRIG_PKG.PITRIG_TRUNCATE and XDB.XDB_PITRIG_PKG.PITRIG_DROP procedures is not properly sanitised before being used in SQL queries. This can be exploited to manipulate an SQL query by injecting arbitrary SQL code.
3) An error within the implementation of the Ultra-Search module can be exploited to bypass security restrictions due to unnecessary high privileges assigned to the WKSYS user account and database schema.
Successful exploitation of the vulnerability requires WKSYS access.
The remaining vulnerabilities are caused due to unspecified errors. No more information is currently available.
The vulnerabilities are reported in the following products and versions:
* Oracle Database 11g, version 220.127.116.11
* Oracle Database 10g Release 2, versions 10.2.0.2, 10.2.0.3
* Oracle Database 10g, version 10.1.0.5
* Oracle Database 9i Release 2, versions 18.104.22.168, 22.214.171.124DV
* Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.0.0, 10.1.3.1.0, 10.1.3.3.0
* Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0
* Oracle Application Server 10g (9.0.4), version 126.96.36.199
* Oracle Collaboration Suite 10g, version 10.1.2
* Oracle E-Business Suite Release 12, versions 12.0.0 - 12.0.3
* Oracle E-Business Suite Release 11i, versions 11.5.9 - 11.5.10 CU2
* Oracle PeopleSoft Enterprise PeopleTools versions 8.22, 8.48, 8.49
Solution: Apply patches (see the vendor's advisory).
Provided and/or discovered by: The vendor credits:
* Esteban Martinez Fayo of Application Security, Inc.
* Pete Finnigan
* Joxean Koret
* Alexander Kornbrust of Red Database Security
* Ali Kumcu of inTellectPro
* David Litchfield of NGS Software
* Mariano Nunez Di Croce of CYBSEC S.A.
* Alexandr Polyakov of Digital Security
Original Advisory: Oracle:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Oracle Products Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.