Do Security Focus:

The following security advisory is sent to the securiteam mailing list, and can be 
found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -



  CERT advisory: Multiple vulnerabilities in Oracle Servers
------------------------------------------------------------------------


SUMMARY

Multiple  vulnerabilities  in  Oracle Application Server have recently 
been  discovered.  These  vulnerabilities  include  buffer  overflows, 
insecure  default  settings,  failures to enforce access controls, and 
failure  to  validate  input.  The  impacts  of  these vulnerabilities 
include  the  execution  of  arbitrary  commands  or  code,  denial of 
service, and unauthorized access to sensitive information.

DETAILS

Vulnerable systems:
Systems running Oracle8i Database
Systems running Oracle9i Database
Systems running Oracle9i Application Server


Oracle  Application  Server  includes a web server based on the Apache 
HTTP  Server. Oracle extends the web server with a number of different 
components that can be used provide interfaces  to database applications. 
These components include, but are not limited to, a Procedural 
Language/Structured Query Language (PL/SQL) module, Java Server  Pages, 
XSQL Servlets, and Simple Object Access Protocol (SOAP) applications.

The vulnerabilities referenced in this advisory were reported in several 
publications by David Litchfield of NGSSoftware:

* Hackproofing Oracle Application Server
 <http://www.nextgenss.com/papers/hpoas.pdf> 
http://www.nextgenss.com/papers/hpoas.pdf

* NGSSoftware Insight Security Research Advisory #NISR20122001
 <http://www.nextgenss.com/advisories/plsql.txt> 
http://www.nextgenss.com/advisories/plsql.txt

* NGSSoftware Insight Security Research Advisory #NISR06022002A
 <http://www.nextgenss.com/advisories/oraplsextproc.txt> 
http://www.nextgenss.com/advisories/oraplsextproc.txt

* NGSSOftware Insight Security Research Advisory #NISR06022002B
 <http://www.nextgenss.com/advisories/oraplsbos.txt> 
http://www.nextgenss.com/advisories/oraplsbos.txt

* NGSSoftware Insight Security Research Advisory #NISR06022002C
 <http://www.nextgenss.com/advisories/orajsa.txt> 
http://www.nextgenss.com/advisories/orajsa.txt
 <http://www.nextgenss.com/advisories/orajsp.txt> 
http://www.nextgenss.com/advisories/orajsp.txt

For  the  complete list of Oracle-related vulnerabilities published by the 
CERT/CC, please search the Vulnerability Notes Database using the term 
'Oracle'.  Details  about specific vulnerabilies can be found in the 
appropriate vulnerability note.

Oracle has addressed these vulnerabilities with patches and recommended 
configuration changes. For more information please see the vendor 
information section.

Buffer overflows

Several  buffer-overflow  vulnerabilities  exist in the way the PL/SQL 
module  handles  HTTP  requests  and configuration parameters. Default 
configuration  settings  in  a  range  of components are insecure, and 
different  components  fail  to  apply  access restrictions uniformly.
These   vulnerabilities   expose   both  the  systems  running  Oracle 
Application   Server  and  the  information  held  in  the  underlying 
databases to undue risk.

Two  more buffer overflow vulnerabilities exist in code that processes 
configuration  parameters.  These  parameters  processes configuration 
parameters   that   can  be  specified  via  the  PL/SQL  gateway  web 
administration interface. By default, access to the PL/SQL gateway web 
administration interface is not restricted [VU#611776].

VU#500203   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via help page request

VU#313280   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via HTTP Location header

VU#750299   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via HTTP request

VU#878603   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via HTTP Authorization header

VU#659043   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via Database Access Descriptor password

VU#923395   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via cache directory name

Insecure default configurations

The  default  installation  of  Oracle  Application  Server includes a 
number  of insecure configuration settings, such as well-known default 
passwords  and  unrestricted  access  to  applications  and  sensitive 
information.

VU#307835  -  Oracle9i  Application  Server OWA_UTIL procedures expose 
sensitive information

VU#736923  -  Oracle  9iAS  SOAP  components  allow anonymous users to 
deploy applications by default

VU#611776   -   Oracle9i   Application   Server   PL/SQL  Gateway  web 
administration interface uses null authentication by default

VU#698467  -  Oracle  9iAS  default  configuration  allows  access  to 
"globals.jsa" file

VU#476619  -  Oracle 9iAS default configuration allows arbitrary users to 
view sensitive configuration files

VU#712723  - Oracle 9iAS default configuration uses well-known default 
passwords

VU#168795  -  Oracle  9iAS  allows  anonymous  remote  users  to  view 
sensitive Apache services by default

VU#278971  -  Oracle  9i Application Server does not adequately handle 
requests  for nonexistent JSP files thereby disclosing web folder path 
information

Failure to enforce access controls

Oracle   Application   Server   does   not  uniformly  enforce  access 
restrictions.   Different   components   do   not   adequately   check 
authorization before granting access to protected resources.

VU#180147  -  Oracle  9i  Database  Server PL/SQL module allows remote 
command execution without authentication

VU#193523 - Oracle 9i Application Server allows unauthenticated access to 
PL/SQL applications via alternate Database Access Descriptor

VU#977251 - Oracle 9iAS XSQL Servlet ignores file permissions allowing 
arbitrary users to view sensitive configuration files

VU#547459  -  Oracle  9iAS creates temporary files when processing JSP 
requests that are world-readable

Failure to validate input

In  one  case,  the PL/SQL module does not properly handle a malformed 
HTTP request.


VU#805915  - Oracle9i Application Server Apache PL/SQL module does not 
properly handle HTTP Authorization header

Impact

The  impacts  of these vulnerabilities include the remote execution of 
arbitrary   code,  remote  execution  of  commands  and  SQL  queries, 
disclosure of sensitive information, and denial of service.

Remote execution of arbitrary commands and code

This section contains vulnerabilities that permit a remote intruder to 
cause  a  denial  of  service  or execute arbitrary commands, code, or 
queries on the system.

Some  of  these vulnerabilities allow execution with the privileges of the 
Apache process. On UNIX systems, the Apache process typically runs as the 
"oracle" user. On Windows systems, the Apache service typically runs  as  
the  SYSTEM user; therefore, an attacker could gain complete control of 
the system by exploiting these vulnerabilities.

VU#500203   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via help page request

VU#313280   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via help page request Location: header

VU#750299   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via HTTP request

VU#878603   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable  to  buffer overflow via HTTP Authorization header password 
parameter

VU#659043   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via Database Access Descriptor password

VU#923395   -   Oracle9i   Application  Server  Apache  PL/SQL  module 
vulnerable to buffer overflow via cache directory name

VU#180147  -  Oracle  9i  Database  Server PL/SQL module allows remote 
command execution without authentication

VU#736923  -  Oracle  9iAS  SOAP  components  allow anonymous users to 
deploy applications by default

VU#712723  - Oracle 9iAS default configuration uses well-known default 
passwords

VU#611776   -   Oracle9i   Application   Server   PL/SQL  Gateway  web 
administration interface uses null authentication by default

Unauthorized access to sensitive information

A  number  of  vulnerabilities  disclose  configuration information or 
expose   data   stored   in   underlying   databases.  Also,  insecure 
applications  could  allow  an intruder to execute SQL queries. Oracle 
system  programmers  may  wish  to  examine  these  vulnerabilities in 
Oracle's  sample pages to prevent similar vulnerabilities in their own 
Oracle applications.

VU#307835  -  Oracle9i  Application Server OWA_UTIL PL/SQL application 
exposes procedures that are remotely accessible by arbitrary users

VU#193523 - Oracle 9i Application Server allows unauthenticated access to 
PL/SQL applications via alternate Database Access Descriptor

VU#698467  -  Oracle  9iAS  default  configuration  allows  access  to 
"globals.jsa" file

VU#476619  -  Oracle 9iAS default configuration allows arbitrary users to 
view sensitive configuration files

VU#977251 - Oracle 9iAS XSQL Servlet ignores file permissions allowing 
arbitrary users to view sensitive configuration files

VU#168795  -  Oracle  9iAS  allows  anonymous  remote  users  to  view 
sensitive Apache services by default

VU#278971  -  Oracle  9i Application Server does not adequately handle 
requests  for nonexistent JSP files thereby disclosing web folder path 
information

VU#547459  -  Oracle  9iAS creates temporary files when processing JSP 
requests that are world-readable

Denial of service

In  the  case where the PL/SQL module does not properly handle an HTTP 
request,   a   denial-of-service   vulnerability   exists.   Also,  an 
unsuccessful  attempt to exploit a buffer overflow vulnerability could 
crash the Apache service.

VU#805915  - Oracle9i Application Server Apache PL/SQL module does not 
properly handle HTTP Authorization header

Solution

Oracle has provided patches and workarounds that address most of these 
vulnerabilities.  Sites using Oracle Application Server are encouraged to  
 install   the   appropriate  patches  and  make  the  recommended 
configuration changes provided by Oracle.

Solutions and workarounds for specific vulnerabilities can be found in 
individual  vulnerability  notes  and in the following Oracle security 
alerts:

* Oracle Security Alert #29
 <http://otn.oracle.com/deploy/security/pdf/plsextproc_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/plsextproc_alert.pdf

* Oracle Security Alert #28
 <http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf

* Oracle Security Alert #25
 <http://otn.oracle.com/deploy/security/pdf/modplsql.pdf> 
http://otn.oracle.com/deploy/security/pdf/modplsql.pdf

* Oracle Security Alert #22
 <http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdf

Security  and  patch  information for Oracle products are available at the 
following locations:

* Oracle Security Alerts
 <http://otn.oracle.com/deploy/security/alerts.htm> 
http://otn.oracle.com/deploy/security/alerts.htm

* MetaLink (registration required)
 <http://metalink.oracle.com/> http://metalink.oracle.com/

Sites using Oracle Application Server may also find David Litchfield's 
Hackproofing  Oracle Application Server paper useful in describing the 
impacts and various interactions of these vulnerabilities.

Apply a patch

Oracle   has   released   patches   that   address   some   of   these 
vulnerabilities.  Patch  information  can  be found in Oracle Security 
Alert  #28  and Oracle Security Alert #25 and on the MetaLink web site 
(registration required).

Secure default configuration

Oracle  has  provided  documentation  on  changing  vulnerable default 
configuration  settings. For details, consult individual Vulnerability 
Notes and the Oracle Security Alerts referenced in the additional 
information section.



ADDITIONAL INFORMATION

The  CERT  Coordination  Center thanks David Litchfield and Oracle for 
information used in this document.

Authors: Art Manion, Jason Rafail, and Shawn Van Ittersum

References

1.  <http://www.kb.cert.org/vuls/id/500203> 
http://www.kb.cert.org/vuls/id/500203
2.  <http://www.kb.cert.org/vuls/id/313280> 
http://www.kb.cert.org/vuls/id/313280
3.  <http://www.kb.cert.org/vuls/id/750299> 
http://www.kb.cert.org/vuls/id/750299
4.  <http://www.kb.cert.org/vuls/id/878603> 
http://www.kb.cert.org/vuls/id/878603
5.  <http://www.kb.cert.org/vuls/id/659043> 
http://www.kb.cert.org/vuls/id/659043
6.  <http://www.kb.cert.org/vuls/id/923395> 
http://www.kb.cert.org/vuls/id/923395
7.  <http://www.kb.cert.org/vuls/id/307835> 
http://www.kb.cert.org/vuls/id/307835
8.  <http://www.kb.cert.org/vuls/id/736923> 
http://www.kb.cert.org/vuls/id/736923
9.  <http://www.kb.cert.org/vuls/id/611776> 
http://www.kb.cert.org/vuls/id/611776
10.  <http://www.kb.cert.org/vuls/id/698467> 
http://www.kb.cert.org/vuls/id/698467
11.  <http://www.kb.cert.org/vuls/id/476619> 
http://www.kb.cert.org/vuls/id/476619
12.  <http://www.kb.cert.org/vuls/id/712723> 
http://www.kb.cert.org/vuls/id/712723
13.  <http://www.kb.cert.org/vuls/id/168795> 
http://www.kb.cert.org/vuls/id/168795
14.  <http://www.kb.cert.org/vuls/id/278971> 
http://www.kb.cert.org/vuls/id/278971
15.  <http://www.kb.cert.org/vuls/id/180147> 
http://www.kb.cert.org/vuls/id/180147
16.  <http://www.kb.cert.org/vuls/id/193523> 
http://www.kb.cert.org/vuls/id/193523
17.  <http://www.kb.cert.org/vuls/id/977251> 
http://www.kb.cert.org/vuls/id/977251
18.  <http://www.kb.cert.org/vuls/id/805915> 
http://www.kb.cert.org/vuls/id/805915
19.  <http://www.kb.cert.org/vuls/id/547459> 
http://www.kb.cert.org/vuls/id/547459
20.  <http://www.nextgenss.com/papers/hpoas.pdf> 
http://www.nextgenss.com/papers/hpoas.pdf
21.  <http://www.nextgenss.com/advisories/plsql.txt> 
http://www.nextgenss.com/advisories/plsql.txt
22.  <http://www.nextgenss.com/advisories/oraplsextproc.txt> 
http://www.nextgenss.com/advisories/oraplsextproc.txt
23.  <http://www.nextgenss.com/advisories/oraplsbos.txt> 
http://www.nextgenss.com/advisories/oraplsbos.txt
24.  <http://www.nextgenss.com/advisories/orajsa.txt> 
http://www.nextgenss.com/advisories/orajsa.txt
25.  <http://www.nextgenss.com/advisories/orajsp.txt> 
http://www.nextgenss.com/advisories/orajsp.txt
26.  <http://otn.oracle.com/deploy/security/pdf/plsextproc_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/plsextproc_alert.pdf
27.  <http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/ias_modplsql_alert.pdf
28.  <http://otn.oracle.com/deploy/security/pdf/modplsql.pdf> 
http://otn.oracle.com/deploy/security/pdf/modplsql.pdf
29.  <http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdf> 
http://otn.oracle.com/deploy/security/pdf/ias_soap_alert.pdf



===================




---------------------------------------------------------------------
Para cancelar a subscri��o, envie mensagem para: 
[EMAIL PROTECTED]
Para comandos adicionais, envie mensagem para: [EMAIL PROTECTED]

Responder a