lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 24 Jul 2003 11:51:27 -0500
From: "Integrigy Security Alerts" <alerts@...egrigy.com>
To: <bugtraq@...urityfocus.com>
Subject: Integrigy Security Alert - Oracle E-Business Suite FNDWRR Buffer Overflow



Integrigy Security Alert
______________________________________________________________________

Oracle E-Business Suite FNDWRR Buffer Overflow
July 23, 2003
______________________________________________________________________

Summary:

The Oracle Applications FNDWRR CGI program, used to retrieve report output
from the Concurrent Manager server via a web browser, has a remotely
exploitable buffer overflow.  A mandatory patch from Oracle is required to
solve this security issue.

Product:    Oracle E-Business Suite
Versions:   11.0 and 11.5.1 - 11.5.8
Platforms:  All platforms
Risk Level: High
______________________________________________________________________

Description:

The Oracle Applications Web Report Review (FNDWRR) program is used to view
reports and logs in a web browser.  FNDWRR is implemented as a CGI program.
The FNDWRR CGI program is named "FNDWRR.exe" on both UNIX and Windows
platforms.

A buffer overflow exists in the FNDWRR program allowing an attacker to
potentially gain control of the process and execute arbitrary code on the
server.  This buffer overflow can be remotely exploited using a web browser
and an overly long URL.

Solution:

Oracle has released patches for Oracle Applications 11.0 and 11i to correct
this vulnerability.  Oracle has fixed the buffer overflow in the FNDWRR
executable and related libraries.

The following Oracle patches must be applied --

      Version     Patch
      -------     -----
      11.0        2919943     (All Releases)
      11i         2919943     (11.5.1 - 11.5.8)

Oracle Applications customers should consider this vulnerability high risk
and apply the above patch during the next maintenance cycle.  Customers with
Internet facing application servers should apply the patch immediately.

Appropriate testing and backups should be performed before applying any
patches.

Additional Information:

  http://www.integrigy.com/resources.htm
  http://otn.oracle.com/deploy/security/pdf/2003alert56.pdf

For more information or questions regarding this security alert, please
contact us at alerts@...egrigy.com.

Credit:

This vulnerability was discovered by Stephen Kost of Integrigy Corporation.
______________________________________________________________________

About Integrigy Corporation (www.integrigy.com)

Integrigy Corporation is a leader in application security for large
enterprise, mission critical applications. Our application vulnerability
assessment tool, AppSentry, assists companies in securing their largest and
most important applications. Integrigy Consulting offers security assessment
services for leading ERP and CRM applications.

For more information, visit www.integrigy.com.





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ