Otkriveni su brojni sigurnosni propusti vezani uz Oracle Database. Radi se o popularnom sustavu za upravljanje relacijskim bazama podataka, a nudi skalabilnost, visoku raspoloživost i automatizaciju upravljanja potrebne za uspostavljanje infrastruktura za grid računarstvo u velikim poslovnim okruženjima. Propusti su uzrokovani pogreškama u brojnim komponentama (npr. Client System Analyzer, Cluster Verify Utility, Database Vault). Napadač može iskoristiti propuste za izvođenje napada uskraćivanja usluge, neovlašten pristup osjetljivim informacijama te pokretanje proizvoljnog programskog koda. Budući da je dostupna odgovarajuća nadogradnja, svi se korisnici upućuju na njenu primjenu.
Oracle Database Multiple Code Execution and Information Disclosure
VUPEN ID VUPEN/ADV-2011-0139
CVE ID CVE-2010-3590 - CVE-2010-3600 - CVE-2010-4413 - CVE-2010-4420 - CVE-2010-4421 - CVE-2010-4423
CWE ID Available in VUPEN VNS Customer Area
CVSS V2 Available in VUPEN VNS Customer Area
Rated as High Risk
Impact Available in VUPEN VNS Customer Area
Authentication Level Available in VUPEN VNS Customer Area
Access Vector Available in VUPEN VNS Customer Area
Release Date 2011-01-19
Technical Description
Multiple vulnerabilities have been identified in Oracle Database, which could be exploited by attackers or malicious users to cause a denial of service, gain knowledge of sensitive information or execute arbitrary code. These issues are caused by errors in the Client System Analyzer, Cluster Verify Utility, Database Vault, Oracle Spatial, and Scheduler Agent components, which could be exploited to compromise a vulnerable database.
Affected Products
Oracle Database 11g Release 2 version 11.2.0.1
Oracle Database 11g Release 1 version 11.1.0.7
Oracle Database 10g Release 2 version 10.2.0.3
Oracle Database 10g Release 2 version 10.2.0.4
Oracle Database 10g Release 2 version 10.2.0.5
Oracle Database 10g Release 1 version 10.1.0.5
Solution
Apply Oracle Critical Patch Update - January 2011 :
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
References
http://www.vupen.com/english/advisories/2011/0139
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
Credits
Vulnerabilities reported by Alexander Kornbrust (Red Database Security), Alexandr Polyakov (Digital Security), Alexey Sintsov (Digital Security Research Group), Andrea Micalizzi aka rgod (TippingPoint Zero Day Initiative), Andrey Labunets (Digital Security Research Group), Cris Neckar (Neohapsis, Inc.), Daniel Fahlgren, Esteban Martinez Fayo (Application Security, Inc.), Evdokimov Dmitriy (Digital Security Research Group), Karan Saberwal, Laszlo Toth, Maksymilian Arciemowicz (SecurityReason), Martin Rakhmanov (Application Security, Inc.), Matt Parcell (Accuvant), Monarch2020 (unsecurityresearch.com), Robert Clugston (Accuvant), Roberto Suggi Liverani (Security-Assessment.com), Rodrigo Rubira Branco (BSDaemon) via TippingPoint Zero Day Initiative, and Sumit Siddharth (7safe).
Changelog
2011-01-19 : Initial release
Posljednje sigurnosne preporuke