The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


AW: Silently fixed security bugs in Oracle Critical Patch Update July 2005


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Subject: AW: Silently fixed security bugs in Oracle Critical Patch Update July 2005
Date: Fri, 15 Jul 2005 19:37:03 +0200
Message-ID: <1C09DF36EB7A3F489633C919E7413501150D5C@mapibe09.exchange.xchg.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Silently fixed security bugs in Oracle Critical Patch Update July 2005
Thread-Index: AcWJYRMbNqPi8vSdRIK7Gx0J2Q7JOAAAV3pg
From: "Kornbrust, Alexander" <ak@red-database-security.com.>
To: "David Litchfield" <davidl@ngssoftware.com.>,
        <bugtraq@securityfocus.com.>
X-OriginalArrivalTime: 15 Jul 2005 17:37:31.0177 (UTC) FILETIME=[E0890190:01C58963]
X-Provags-ID: kundenserver.de [email protected] ident:@172.23.1.26
X-Virus-Scanned: antivirus-gw at tyumen.ru

Hi David and all,

You are right.=20

Bug 2576249 (DAV_PUBLIC) was discovered by the Litchfield brothers and =
is already fixed with Alert 52.=20

Correct me if I'm wrong, but I am not aware that the other bugs (Memory =
leak, webcache SSL 40bit encryption, oraaltpassword ...) are already =
covered by another Oracle security alert.

Cheers

 Alexander Kornbrust

 Red-Database-Security GmbH
 http://www.red-database-security.com



-----Urspr=FCngliche Nachricht-----
Von: David Litchfield [mailto:davidl@ngssoftware.com.]=20
Gesendet: Freitag, 15. Juli 2005 19:17
An: Kornbrust, Alexander; [email protected]
Betreff: Re: Silently fixed security bugs in Oracle Critical Patch =
Update July 2005

Hi Alex and all,

> After reading the patch documentation and some tests with the CPU July =

> 2005 I found out that Oracle fixed some security bugs silently without =

> mention these bugs in their current risk matrix.
>
> Detailed information about most of these bugs are not available via=20
> Metalink but in many cases the description is sufficient for a =
malicious=20
> attacker
> (e.g. "/DAV_PUBLIC IS NOT PROTECTED BY DEFAULT ENABLING MALITIOUS USER =
TO=20
> FILL IT UP")
>
> For Mod_Oradav 9.0.2.3:
> 2576249 - /DAV_PUBLIC IS NOT PROTECTED BY DEFAULT ENABLING MALITIOUS =
USER=20
> TO FILL IT UP
> 2544464 - ORAALTPASSWORD SHOULD BE ENCRYPTED AND NOT JUST OBFUSCATED

I don't think this one was silently fixed - see=20
http://www.securitytracker.com/alerts/2003/Feb/1006098.html

Cheers,
David Litchfield
NGSSoftware Ltd
http://www.ngssoftware.com/



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру