(original note posted to FD, BT, and more) From: David Litchfield (davidlngssoftware.com) Date: Tue Nov 15 2005 - 07:12:41 CST
Whilst looking over old Oracle bugs I discovered that a _fully_ _patched_ 126.96.36.199 Oracle server is still vulnerable to the old extproc flaw [http://www.ngssoftware.com/advisories/oraplsextproc.txt]; this flaw, when exploited, allows a remote attacker without a userID and password to take control of the server. Why, you may ask, has a supported product gone for so long without a patch for a serious problem that was made public 3 years and 10 months ago and reported to Oracle over 4 years ago? The answer, according to Alert 57 [http://www.oracle.com/technology/deploy/security/pdf/2003alert57.pdf], is that Oracle outright decided not to fix it. They claim "architectural constraints" are the problem even though they managed to overcome these same constraints on newer versions of Oracle. Users of 188.8.131.52 would do well to heed the advice offered in Alert 57 if they've not already done so. You are a subscribed member of the infowarrior list. Visit www.infowarrior.org for list information or to unsubscribe. This message may be redistributed freely in its entirety. Any and all copyrights appearing in list messages are maintained by their respective owners.