[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) Patch for Potential Vulnerability in Oracle XSQL Servlet

[Oracle under Linux is vulnerable -- Raju]

This is an RFC 1153 digest.
(1 message)

Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: beng@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
X-Mailer: Mozilla 4.73 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID:  <3A6D51B6.91B515F9@xxxxxxxxxx>
Reply-To: Oracle Security Alerts <secalert_us@xxxxxxxxxx>
Organization: Oracle Product Security Management
From: Oracle Security Alerts <secalert_us@xxxxxxxxxx>
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject:      Patch for Potential Vulnerability in Oracle XSQL Servlet
Date:         Tue, 23 Jan 2001 01:41:10 -0800

Patch for Potential Vulnerability in Oracle XSQL Servlet

A potential security vulnerability in Oracle XSQL Servlet has been
discovered when using stylesheets as URL parameters which permits the
execution of arbitrary Java code on the Oracle database server
with elevated privileges. This vulnerability was discovered in Oracle8i,
Release, Enterprise Edition running Oracle Internet
Application Server (iAS) and XSQL Servlet, Release, on MS
Windows 2000. It also exists in XSQL releases to on all

Oracle has corrected this vulnerability in the new release of XSQL
Servlet as well as provided more secure behavior by default. The new
release of XSQL Servlet, Release, can be obtained from Oracle
Technology Network, OTN, http://otn.oracle.com/tech/xml/xsql_servlet. A
patch will also be available in the upcoming Oracle8i, Release,
patch set and available for use with iAS Release

Oracle Corporation wishes to thank Georgi Guninski for discovering this
vulnerability and promptly bringing it to Oracle's attention.


End of this Digest

Raju Mathur          raju@xxxxxxxxxxxxx           http://kandalaya.org/