Call now: 252-767-6166  
Oracle Training Oracle Support Development Oracle Apps

 E-mail Us
 Oracle Articles
New Oracle Articles

 Oracle Training
 Oracle Tips

 Oracle Forum
 Class Catalog

 Remote DBA
 Oracle Tuning
 Emergency 911
 RAC Support
 Apps Support
 Oracle Support

 SQL Tuning

 Oracle UNIX
 Oracle Linux
 Remote s
 Remote plans
 Application Server

 Oracle Forms
 Oracle Portal
 App Upgrades
 SQL Server
 Oracle Concepts
 Software Support

 Remote S


 Consulting Staff
 Consulting Prices
 Help Wanted!


 Oracle Posters
 Oracle Books

 Oracle Scripts

Don Burleson Blog 







Admins grapple with latest Oracle patch puzzle

By Bill Brenner, News Writer
24 Oct 2005 |

Following Oracle Corp.'s release of several dozen software patches, security experts quickly began warning of holes left unfixed and the emergence of at least one exploit. But Nirnay Patil wasn't losing any sleep over it.

Sure, the latest patches cover "a lengthy laundry list" of security holes, said Patil, database administrator for Boston-based wireless communications provider American Tower Corp. But while users almost always complain of too few details and malfunctioning patches after an Oracle security update, Patil said his job is much easier since the Redwood Shores, Calif.-based database giant instituted a quarterly patching process last November.

"There's a lot of effort to pick through the advisory and see exactly what I need. You have to review the document very carefully," Patil said. "But at least with a quarterly process, you know when the next release is coming and you can schedule the deployment work well ahead of time. You can work out the manpower issues and all that. And when the patches come out, there's time to test things more carefully."

When Oracle Chief Security Officer Mary Ann Davidson announced the quarterly system last year, she said database administrators overwhelmingly asked for a schedule they could plan around, but not something as frequent as the monthly process the company originally conceived last year. To Patil, it was a relief.

"You're dealing with systems that are so interconnected," he said, "you don't want to go in there too often. It's much better to have a spread out process you can plan for."

But security experts say administrators shouldn't wait long to deploy these latest patches because they cover extensive security holes that could easily be attacked. They also warn that some known flaws went unfixed this time around and that at least one piece of exploit code is circulating.

Gaping glitches, words of advice

Caleb Sima, CTO of Atlanta-based Web application security firm SPI Dynamics Inc., said his company discovered one of the flaws, in Oracle Application Server 10g (10.1.2). "What we found was a buffer overflow in the server's management console," he said. "You could connect to the console and send a buffer overflow to an application, which could then allow you to take over the system."

If the data input string is longer than 2,000 characters, he said, the application server "can't handle it and spits up, allowing someone to take over the machine." Sima added that no authentication is required.

His advice to administrators: don't make management consoles open and available on the Internet. "Make it internally available only," Sima suggested. "Those who have their management consoles available online are really increasing their risk of attack."

Another application security firm, Chicago-based Integrigy Corp., issued a similar warning regarding the Oracle E-Business Suite.

"Customers with Internet-facing implementations of the Oracle E-Business Suite are at most risk and should consider applying these patches quickly," it said in an advisory. "The Oracle E-Business Suite patches involved with this Critical Patch Update (CPU) are much more complex as compared to the previous CPUs, and will require additional functional testing in our opinion. In addition, the [patches] are not cumulative. Therefore, all the patches specified in this CPU and previous CPUs must be applied."

A new exploit and unfixed bugs

Amid the plethora of patches, experts warn that exploit code is in the wild. Pete Finnigan, an Oracle expert and author of Oracle Security Step By Step, warned in his blog Thursday:

"Someone has published an exploit for one of the bugs fixed in the… Oct 18 2005 security patch… It is not good that exploits are now in the public domain as anyone who has not patched is now vulnerable. All customers of Oracle should patch promptly."

Meanwhile, David Litchfield, managing director at U.K.-based Next Generation Security Software Ltd., said in a message posted to the BugTraq forum that he gave the latest CPU a "cursory examination" and found that it doesn't fix some of the vulnerabilities Oracle had told him would be fixed.

"Once again the patch is not sufficient," said Litchfield, who has offered similar criticisms of past Oracle patches. He said he would "conduct a full investigation of the patch over the coming few days and post some recommendations once complete."

Can speed kill?

While Oracle and others have recommended that users apply patches quickly, for a customer company with a large and complex network, is it reasonable to expect database managers to move quickly, or to even deploy the entire patch load?

"There are two philosophies about applying patches," Don Burleson, Oracle expert and CEO of Kittrell, N.C.-based BC Remote DBA, said in an e-mail exchange. "One school says that all patches should be applied because it may prevent a future problem. The other school is more conservative and adopts the philosophy of 'If it's not broken, don't fix it.'"

He said each Oracle shop must assess its individual risk. For instance, patch urgency is greatly diminished for databases that are detached from the Internet or where internal security is not a concern. Speedy deployments can also be risky because a patch could introduce new problems, Burleson said. "All Oracle shops that apply any patch sets should conduct thorough testing… to ensure against any unintended side effects."

Your patching time may vary

At American Tower, which runs Oracle's E-Business Suite, Patil said the Oracle patch process can take a couple days or a couple weeks to complete, depending on how big the patch load is. As far as he's concerned, careful testing is paramount, even if it slows down the deployments.

"We go through the [patch detail] document very, very carefully and figure out which pieces we use," he said. "We check those pieces, get the patch numbers and download those that apply to our platform, which is HP Unix."

The next, and perhaps most important step is careful testing, Patil said. "In a production environment, even if the patch is only breaking something small, you have to be careful and make adjustments," he said.

A patch is tested at the technical level, then the business level, then at the management level, he said, adding, "Then I put my stamp on it." How has this quarter's cycle gone so far? When asked Thursday, Patil said, "We should at least have everything set at the tech level by tomorrow [last Friday]."




Oracle Training at Sea
oracle dba poster

Follow us on Twitter 
Oracle performance tuning software 
Oracle Linux poster


Burleson is the American Team

Note: This Oracle documentation was created as a support and Oracle training reference for use by our DBA performance tuning consulting professionals.  Feel free to ask questions on our Oracle forum.

Verify experience! Anyone considering using the services of an Oracle support expert should independently investigate their credentials and experience, and not rely on advertisements and self-proclaimed expertise. All legitimate Oracle experts publish their Oracle qualifications.

Errata?  Oracle technology is changing and we strive to update our BC Oracle support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:  

and include the URL for the page.


Burleson Consulting

The Oracle of Database Support

Oracle Performance Tuning

Remote DBA Services


Copyright © 1996 -  2020

All rights reserved by Burleson

Oracle ® is the registered trademark of Oracle Corporation.