lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050428171600.14655.qmail@www.securityfocus.com> Date: 28 Apr 2005 17:16:00 -0000 From: Alexander Kornbrust <ak@...-database-security.com> To: bugtraq@...urityfocus.com Subject: File appending vulnerability in Oracle Webcache 9i Red-Database-Security GmbH Research Advisory Name Append file vulnerability in Oracle Webcache 9i Systems Affected Oracle Webcache Severity Medium Risk Category Corruption of files Vendor URL http://www.oracle.com Author Alexander Kornbrust (ak at red-database-security.com) Date 26 Apr 2005 (V 1.00) Advisory number AKSEC2003-012 Description ########### File appending vulnerability in Oracle Webcache 9i. More details available: ####################### It is possible to append garbage to files of the Oracle Application Server installation. This vulnerability can be combined with CSS. http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html Patch Information ################# This issue was fixed silently. Apply the latest patchset for Oracle Application Server. History: ######## 23 September 2003 Oracle secalert was informed 23 September 2003 Bug confirmed 26 April 2005 Advisory released About Red-Database-Security GmbH ################################# Red-Database-Security GmbH is a specialist in Oracle Security. http://www.red-database-security.com