what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

oracle.iss.txt

oracle.iss.txt
Posted Nov 12, 1999
Site iss.net

ISS Security Advisory: Multiple Root Compromise Vulnerabilities in Oracle Application Server for Solaris. An account on the target system is required to exploit these vulnerabilities. Oracle Application Server prior to release 4.0.8 is affected by these vulnerabilities.

tags | exploit, root, vulnerability
systems | solaris
SHA-256 | efb4afb5de23974d9b3bcdbaf09f000d1e0757705e82f4e88a4061c72070a989

oracle.iss.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

ISS Security Advisory
November 10, 1999

Multiple Root Compromise Vulnerabilities in Oracle Application Server

Synopsis:

Internet Security Systems (ISS) X-Force has discovered multiple
vulnerabilities in the Oracle Application Server (OAS) that may lead to
local super-user access. Attackers may use these vulnerabilities to destroy
root owned files as well as gain root access. An account on the target
system is required to exploit these vulnerabilities.

Affected Versions:

ISS X-Force has determined that Oracle Application Server version 4.0 for
Solaris is affected by these vulnerabilities. All revisions prior to
version 4.0.8 are affected.

Description:

Server Startup Vulnerabilities: The Oracle Application Server is owned by
the user 'oracle' in most configurations. This includes the administrative
utilities to start, stop, and manipulate the servers. Unprivileged users
may not bind servers to ports below 1024. Oracle has made the 'owslctl'
utility root, which allows normal users to start the server on privileged
ports. Attackers may take advantage of this design to compromise super-user
access.

Apache Startup Vulnerabilities: The Oracle Application Server offers web
administrators the option to install and configure HTTP listeners. The
Oracle Management server supports both Netscape and Apache listeners in
addition to those provided by Oracle with the Application Server. An
administrator choosing to install an Apache listener must supply a unique
name, a path to the server's executable, and a configuration file. Once
supplied, a backend setuid root executable attempts to start the Apache
server.

An attacker with an unprivileged account on the target system may trick
'apchlctl' into executing any arbitrary command as root. The Apache start
executable is also unsafe in handling write() calls and certain files
created will follow symbolic links.

Recommendations:

Oracle has supplied ISS X-Force with two potential fixes for the described
vulnerabilities. Oracle has informed ISS X-Force that fix 1, which is most
secure, will affect OAS failure recovery for Oracle Web Listener processes
running on port numbers < 1024. Fix 2, which is less secure, requires that
the Oracle account be treated as a trusted account and customers should take
all precautions necessary to protect access to it. ISS X-Force recommends
that Oracle Application Server administrators carefully evaluate these fixes
before they are applied.

Oracle customers can find important information on this OAS security issue
on Oracle's web-based Metalink system at https://metalink.oracle.com.
Customers should reference document number 76484.1 under the advanced search
engine available on Metalink. Customers can also find an alert under Oracle
Application Server on the Oracle Metalink system.

ISS X-Force recommends verifying the existence of the vulnerability through
the use of System Scanner. For additional info please visit the following
URL: https://www.iss.net/prod/ss.php3

To download the checks for System Scanner Version 3 Solaris Agent go to the
following URL: https://www.iss.net/tech/flexchecks/


Credits:

These vulnerabilities were primarily researched by Dan Ingevaldson of the
ISS X-Force. ISS X-Force would like to thank Oracle Corporation for their
response and handling of these vulnerabilities.


About ISS
ISS is a leading global provider of security management solutions for
e-business. By offering best-of-breed SAFEsuite(tm) security software,
comprehensive ePatrol(tm) monitoring services and industry-leading
expertise, ISS serves as its customers' trusted security provider protecting
digital assets and ensuring the availability, confidentiality and integrity
of computer systems and information critical to e-business success. ISS'
security management solutions protect more than 5,000 customers including 21
of the 25 largest U.S. commercial banks, 9 of the 10 largest
telecommunications companies and over 35 government agencies. Founded in
1994, ISS is headquartered in Atlanta, GA, with additional offices
throughout North America and international operations in Asia, Australia,
Europe and Latin America. For more information, visit the ISS Web site at
www.iss.net or call 800-776-2362.


Copyright (c) 1999 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent
of the X-Force. If you wish to reprint the whole or any part of this
Alert in any other medium excluding electronic medium, please e-mail
xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.

X-Force PGP Key available at: https://xforce.iss.net/sensitive.php3 as
well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net
of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOCnRMjRfJiV99eG9AQHBAAQAu4h6zzPkGddTVs07GGcm7H6RFec9Iikl
WomJ0kuFyJhfKWpal/lVFOXBHJ/uWDEa/m/jYL7ewzvOEAwd3jrQsxQuiYXJs7zo
e/eRzwFwoHBVInaOHAqt8NpIn9oYWRYZNMLi0lFauDFdMwpHITXI4JtSkKV74RPN
cR/Mzi9pbbs=
=0aJp
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close