Un-Patched Oracle Flaws Abound?

Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Oracle users may potentially be at risk from a half dozen vulnerabilities, even if they applied the company's latest patch released last week.

German security research Alexander Kornbrust of Red-Database-Security has issued six security advisories affecting Oracle Forms and Oracle Reports.

On the highly critical side, the vulnerabilities could allow a system to be compromised, provide for privilege escalation attacks or allow an attacker to overwrite arbitrary files. At the low end, the flaws could be used for cross site scripting attacks or information disclosure.

Kornbrust claims that he informed Oracle of the flaws as early as 2003. The security researcher alleges in his advisory timeline that Oracle was again notified in April and that if that flaws were not fixed in Oracle's July Critical Patch update, the flaws would go public.

On July 12, Oracle issued its quarterly Critical Patch Update, which included some 49 different matches for various flaws in various versions of its Enterprise Manager, Database server, Collaboration Suite, E-Business applications and Application Server products.

Oracle has not yet publicly addressed or confirmed Kornbrust's claims on its security Web site.

An Oracle spokesperson told internetnews.com that security is a matter Oracle takes seriously and Oracle's first priority is meeting customer needs and reducing their risk.

"When software flaws are discovered, Oracle responds as quickly as possible to help protect information secured by customers in Oracle-based information systems," the spokesperson said. "Oracle's policy is to fix security vulnerabilities in severity order –- higher severity vulnerabilities are fixed as a priority over lower severity vulnerabilities."

Oracle encourages customers and researchers to contact them as soon as they discover security vulnerabilities, the spokesperson explained.

This article was first published on internetnews.com, a JupiterWeb site. To read the entire article, click here.

Submit a Comment

Loading Comments...