Oracle FAQ | Your Portal to the Oracle Knowledge Grid |
![]() |
![]() |
Home -> Community -> Mailing Lists -> Oracle-L -> RE: Security Issue with Oracle 9i R2 Databse
thanks Edger for Doc ....One of my cleint usualy travelled a lot(from =
one country to another) with his Laptop and there some sensitive =
information on his laptop and and connected through Dialup ...he is =
using FOUND SCAN TOOL and he getting this report shown below .=20
*********************************Report**********************************= ************************************ BRIZKN | 165.197.20.181 =20 Apache mod_ssl Off-By-One HTAccess Buffer Overflow =20Description: =20
hosts. =20 Response from System: =20
Script Output:
http/1.1 200 ok
date: wed, 16 jun 2004 07:24:17 gmt
server: oracle http server powered by apache/1.3.22 (win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 openssl/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
last-modified: tue, 20 aug 2002 21:41:18 gmt
etag: "0-89a-3d62b77e"
accept-ranges: bytes
content-length: 2202
connection: close
content-type: text/html
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta http-equiv=3D"content-type" content=3D"text/html; ch
=20 Recommendation: =20
http://www.modssl.org/=20
Common Vulnerabilities & Exposures (CVE) Link:=20
CVE-2002-0653 =20
Oracle soaprouter accessible =20
Description: =20
A configuration vulnerability in the Oracle Application Server allows =
remote attackers to perform administrative actions on the targeted =
server. =20 Recommendation: =20
ApJServGroup group2 1 1
$ORACLE_HOME/Apache/Jserv/etc/jservSoap.properties
ApJServMount /soap/servlet ajpv12://localhost:8200/soap
ApJServMount /dms2 ajpv12://localhost:8200/soap
ApJServGroupMount /soap/servlet balance://group2/soap =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CVE-2001-1371 =20
Oracle 9i Database Server iSQL Plus USERID Buffer Overflow =20
Description: =20
A remotely exploitable buffer overflow condition is present the =
authentication process of Oracle iSQL*Plus. =20
Response from System: =20
=20
Script Output:
Request:
/isqlplus
Response:
ed. -->
<meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dwindows-1252">
<title>isql*plus release 9.2.0.1.0 production: login</title>
<link rel=3D"stylesheet" href=3D"/iplus/iplus.css" type=3D"tex
=20 Recommendation: =20
Script Output:
http/1.1 200 ok
date: wed, 16 jun 2004 07:14:04 gmt
server: oracle http server powered by apache/1.3.22 (win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 openssl/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
last-modified: tue, 20 aug 2002 21:41:18
=20 Recommendation: =20
http://httpd.apache.org/download.cgi
http://www.modssl.org/=20
Common Vulnerabilities & Exposures (CVE) Link:=20
CVE-2002-0082 =20
Oracle TNS Listener Unauthorized Access =20
Description: =20
A Oracle TNS Listener has been detected on the host. =20
Recommendation: =20
It is recommended to only allow certain IP's or subnet ranges to access =
the TNS listener. This can be done by adding a rule in the firewall. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CVE-2002-0567 =20
Apache Escape Characters Vulnerability =20
Description: =20
A problem exists in Apache's handling of escape characters in access =
logs. =20
Response from System: =20
=20
Script Output:
http/1.1 200 ok
date: wed, 16 jun 2004 07:07:25 gmt
server: oracle http server powered by apache/1.3.22 (win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 openssl/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
last-modified: tue, 20 aug 2002 21:41:18
=20 Recommendation: =20
http://httpd.apache.org/download.cgi =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CAN-2003-0083 =20
Oracle 9i Application/Database Server SOAP DTD Vulnerability =20
Description: =20
Oracle9i Application and Database server contain a vulnerability in the =
processing of SOAP (Simple Object Access Protocol) messages whose XML =
contains carefully constructed Data Type Definitions (DTDs). =20
Recommendation: =20
Workarounds:
If SOAP is protected by client authentication before the processing of = SOAP XML data structures, unauthenticated clients do not pose a threat; = for example, SSL sessions protected by Client X.509 certificates are = protected against unauthenticated clients.
For those sites that do not use SOAP, disabling SOAP is a workaround. = Disable SOAP by removing or renaming the following SOAP library, which = is delivered in the following JAR file:
[Oracle Home]/soap/lib/soap.jar
Removing or renaming this library will remove access to SOAP, including = support for Web services functionality.
Patch Availability:
Please see Metalink Document ID 259556.1:
http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_da=
tabase_id=3DNOT&p_id=3D259556.1 =20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
OpenSSL ASN.1 Parsing Recursion Denial-of-Service =20
Description: =20
A denial-of-service vulnerability in OpenSSL allows remote attackers to =
stop a targeted Web server from responding. =20
Response from System: =20
Script Output:
http/1.1 200 ok
date: wed, 16 jun 2004 07:24:40 gmt
server: oracle http server powered by apache/1.3.22 (win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 openssl/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
last-modified: tue, 20 aug 2002 21:41:18 gmt
etag: "0-89a-3d62b77e"
accept-ranges: bytes
content-length: 2202
connection: close
content-type: text/html
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta http-equiv=3D"content-type" content=3D"text/html; ch
=20 Recommendation: =20
SGI has released the following patches:
ftp://patches.sgi.com/support/free/security/patches/6.5.19/patch5362.tar ftp://patches.sgi.com/support/free/security/patches/6.5.20/patch5405.tar ftp://patches.sgi.com/support/free/security/patches/6.5.21/patch5363.tar Cisco patches are available to registered users from: http://www.cisco.com/tacpage/sw-center/ =20Common Vulnerabilities & Exposures (CVE) Link:=20 CAN-2003-0851 =20
Workaround:
Restricting access to the Dynamic Monitoring Services.
http://httpd.apache.org/ =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CAN-2003-0020 =20
Oracle9iAS unauthorized Java Process Manager access. =20
Description: =20
An unauthorized access to the Java Process Manager vulnerability exists =
within Oracle9iAS Web Server which discloses sensitive information to an =
attacker. =20
Recommendation: =20
Restricting access to the /oprocmgr-status page.
This patch is available (patch #1554571) on Oracle's Support Services =
site:
http://metalink.oracle.com
To download the patch, register and login to the Oracle Metalink site if =
not already done so. Then simply download the patch to a temp directory, =
and run the patch from there. The patch will have instructions on what =
to do next. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
Oracle sqldemos CSS and database access =20
Description: =20
Vulnerabilities in various demo applets and scripts included with Oracle =
allow remote attackers to conduct cross-site scripting attacks, access =
databases, and perform other actions on the targeted system. =20
Recommendation: =20
Remove demo scripts from servers in a production environment. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
Oracle9iAS Sample Scripts Information Disclosure =20
Description: =20
An information disclosure vulnerability exists within Oracle9i Web =
Server which allows an attacker to gather sensitive information about =
the system. =20
Recommendation: =20
Oracle has released a patch for this vulnerability. To download the =
patch, you must have a membership account with Oracle Support. If you do =
not have one, follow the link below:
http://otn.oracle.com/admin/account/membership.html
If you currently have a support membership, download the patch listed = below.
OJSP 1.1.2.0.0, which can be obtained here:
http://otn.oracle.com/software/tech/java/servlets/content.html=20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
Oracle9i HTTP Server JSP Path Disclosure =20
Description: =20
A path disclosure vulnerability exists within some versions of Oracle =
HTTP server that allows for an attacker to obtain filesystem =
information.
Recommendation: =20
Oracle has also provided the following workaround:
Ensure that the virtual path in a URL is different from the actual =
directory path when using Oracle Apache JServ. Also, do not use the =
(servletzonepath) directory in 'ApJServMount (servletzonepath) =
(servletzone)' to store data or files. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CVE-2001-1372 =20
TRACE HTTP method enabled =20
Description: =20
An information disclosure vulnerability in various Web servers allows =
attackers to retrieve cookies or other sensitive data from Web client =
browsers. =20
Response from System: =20
=20
Script Output:
Request:
TRACE / HTTP/1.1
Host: 2781156533
Cookie: Foundscan=3Dsample-cookie-would-be-here
Script: <script>alert('GOTCHA')</script>
Response:
HTTP/1.1 200 OK
Date: Wed, 16 Jun 2004 07:18:53 GMT
Server: Oracle HTTP Server Powered by Apache/1.3.22 (Win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 OpenSSL/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
Transfer-Encoding: chunked
Content-Type: message/http
7f
TRACE / HTTP/1.1
Cookie: Foundscan=3Dsample-cookie-would-be-here
Host: 2781156533
Script: <script>alert('GOTCHA')</script>
0
=20 Recommendation: =20
Microsoft IIS - Use the Microsoft URLScan tool to deny HTTP TRACE = requests
URLScan Tool:
http://www.microsoft.com/technet/security/tools/urlscan.asp
Apache Software Foundation - Use the ReWrite MOD for Apache to deny HTTP =
TRACE
mod_rewrite:
http://httpd.apache.org/docs/mod/mod_rewrite.html
Sun Microsystems - Sun Alert ID: 50603:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=3Dfsalert/50603 =20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
Oracle9iAS soapConfig.xml SOAP Configuration Disclosure =20
Description: =20
A configuration file disclosure vulnerability exists within Oracle9iAS =
which allows an attacker to access sensitive information. =20 Recommendation: =20
Workaround:
Restrict access to 'soapConfig.xml' in httpd.conf.
By default, this file is named soapConfig.xml and is placed in the =
directory $SOAP_HOME/webapps/soap/WEB-INF/config on UNIX or =
%SOAP_HOMEwebappssoapWEB-INFconfig on Windows NT. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CAN-2002-0568 =20
Apache rotatelogs Denial of Service =20
Description: =20
A vulnerability in the rotatelogs program for the Apache HTTP Server =
allows remote attackers to stop targeted hosts from logging actions. =
=20
Response from System: =20
=20
Script Output:
http/1.1 200 ok
date: wed, 16 jun 2004 07:37:33 gmt
server: oracle http server powered by apache/1.3.22 (win32) =
mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 openssl/0.9.6b mod_fastcgi/2.2.12 =
mod_oprocmgr/1.0 mod_perl/1.25
last-modified: tue, 20 aug 2002 21:41:18
=20 Recommendation: =20
http://httpd.apache.org/ =20
Common Vulnerabilities & Exposures (CVE) Link:=20
CAN-2003-0460 =20
FastCGI echo2.exe Cross-site Scripting =20
Description: =20
A cross-site scripting vulnerability in FastCGI echo2.exe CGI script =
allows remote attackers to submit requests containing potentially =
malicious html or scripts to the Web server. =20
Recommendation: =20
Foundstone recommends that you remove the FastCGI sample scripts, =
including echo2.exe, from any server in a production environment. =20
Common Vulnerabilities & Exposures (CVE) Link:=20
None =20
Web Server Supports Weak SSL Encryption Certificates =20
Description: =20
The host uses weak cipher keys when communicating using the SSL =
protocol. =20 Recommendation: =20
***************************************************end of = report******************************************thanks=20
-----Original Message-----
From: oracle-l-bounce_at_freelists.org
[mailto:oracle-l-bounce_at_freelists.org]On Behalf Of Edgar Chupit
Sent: Wednesday, June 30, 2004 12:26 PM
To: Abhishek Saxena
Subject: Re: Security Issue with Oracle 9i R2 Databse
Hello Abhishek,
AS> 1. Due to some Security concern
what is this concern? can you, please, be more specific.
AS> how can i diable Jserver Option in Oracle Database 9i R2 ...
Please see Note:209870.1 titled "How to Reload the JVM in 9.2.0.X".
For other security related problems, you may wish to wish to visit Pete Finnigan's site http://www.petefinnigan.com/ it is full of different security related information.
--=20
Best regards,
Edgar
-- Archives are at http://www.freelists.org/archives/oracle-l/ FAQ is at http://www.freelists.org/help/fom-serve/cache/1.html ----------------------------------------------------------------- ---------------------------------------------------------------- Please see the official ORACLE-L FAQ: http://www.orafaq.com ---------------------------------------------------------------- To unsubscribe send email to: oracle-l-request_at_freelists.org put 'unsubscribe' in the subject line. -- Archives are at http://www.freelists.org/archives/oracle-l/ FAQ is at http://www.freelists.org/help/fom-serve/cache/1.html -----------------------------------------------------------------Received on Wed Jun 30 2004 - 02:56:54 CDT
![]() |
![]() |