Critical Bug Reported in Oracle Servers

April 26, 2012 By Ali Loney

1 minute read time

April 26, Threatpost ­ (International) Critical bug reported in Oracle servers. There is a critical remotely exploitable vulnerability in all of the current versions of the Oracle database server that can enable an attacker to intercept traffic
and execute arbitrary commands on the server. The bug, which Oracle reported as fixed in the most
recent Critical Patch Update (CPU), is only fixed in upcoming versions of the database, not in currently shipping releases, and there is publicly available proof-of-concept exploit code circulating. The vulnerability lies in the TNS Listener service, which on Oracle databases functions as the service that routes connection requests from clients to the server itself. A researcher said he discovered the vulnerability several years ago and then sold the details of the bug to a third-party broker, who reported it to Oracle in 2008. Oracle credited the researcher for reporting the bug in its April CPU, but he said in a post on the Full Disclosure mailing list the week of April 23 that the flaw was not actually fixed in the current versions of the Oracle database server.

Source: http://threatpost.com/en_us/blogs/critical-bug-reported-oracle-servers-042612

Tags: News, component vulnerabilities, AppSec Spotlight

Written by Ali Loney

Ali Loney is a Senior UX Designer at Walmart Labs. She is based in Canada and was the former Graphic Designer at Sonatype.