Oracle Training Oracle Support Development Oracle Apps

 
 Home
 E-mail Us
 Oracle Articles
New Oracle Articles


 Oracle Training
 Oracle Tips

 Oracle Forum
 Class Catalog


 Remote DBA
 Oracle Tuning
 Emergency 911
 RAC Support
 Apps Support
 Analysis
 Design
 Implementation
 Oracle Support


 SQL Tuning
 Security

 Oracle UNIX
 Oracle Linux
 Monitoring
 Remote s
upport
 Remote plans
 Remote
services
 Application Server

 Applications
 Oracle Forms
 Oracle Portal
 App Upgrades
 SQL Server
 Oracle Concepts
 Software Support

 Remote S
upport  
 Development  

 Implementation


 Consulting Staff
 Consulting Prices
 Help Wanted!

 


 Oracle Posters
 Oracle Books

 Oracle Scripts
 Ion
 Excel-DB  

Don Burleson Blog 


 

 

 


 

 

 

Linda Webb

Got breaking Oracle news?    Burleson Consulting Oracle News

Click here for more Oracle News Headlines

 


David Litchfield releases Workaround for Unpatched Oracle Security Bug

Pete Finnigan has reported in his blog that David Litchfield has found a workaround to a critical flaw in the Oracle PL/SQL gateway.  However Oracle Corporations struck-back claiming that this workaround will break several Oracle components:

http://www.petefinnigan.com/weblog/archives/00000713.htm

At 6.25pm today David Litchfield has posted a workaround for an un-patched critical flaw in the Oracle PL/SQL gateway. This is a component in iAS, OAS and the Oracle HTTP server. The bug allows an attacker to bypass the PLSQLExclusion list that stops access to critical packages and procedures. The post to the bugtraq mailing list is titled "Workaround for unpatched Oracle PLSQL Gateway flaw" and it gives details of mod_rewrite rules that can be added to the httpd.conf file. mod_rewrite is available on the platforms. The rules check for a trailing right hand bracket which is a signature of the attack.

I was aware of this issue as I had seen the NISCC post previously. Anyone who has the Oracle HTTP server enabled needs to apply this workaound immediatley.

David Litchfield posts the workaround here:

http://www.securityfocus.com/archive/1/423029

The workaround is trivial; using mod_rewrite, which is compiled into
Oracle's Apache distribution it is possible to stop the attack. The
workaround checks a user's web request for the presence of a right facing
bracket, ')'.

Add the following four lines to your http.conf file then stop and restart
the web server

RewriteEngine on
RewriteCond %{QUERY_STRING} ^.*\).*|.*%29.*$
RewriteRule ^.*$ http://127.0.0.1/denied.htm?attempted-attack
RewriteRule ^.*\).*|.*%29.*$ http://127.0.0.1/denied.htm?attempted-attack

Oracle Disagrees about the workaround

However, Oracle Corporation does not agree and claims that Litchfield’s workaround is dangerous:

http://www.networkworld.com/news/2006/012706-oracle-security.html?page=1

“Oracle is warning its customers not to use a workaround written by David Litchfield for a security vulnerability, saying the suggested workaround could break its software. Litchfield, managing director of Next Generation Security Software Ltd. in Sutton, England, said he posted the fix on the BugTraq mailing list on Wednesday after warning Oracle about the dangers the vulnerability posed.  Oracle was notified of the workaround before it was released, but has found it "inadequate," said Duncan Harris, Oracle's senior director of security assurance. It will break a large number of E-Business Suite applications, he said.

"We know it will break a number of Oracle products higher in the stack than the Oracle Application Server that the vulnerability exists in," Harris said.”

Oracle goes on to criticize these security advisors, claiming that they actually perform a disservice to the Oracle community by exploiting the internals of vulnerabilities and Oracle rootkits:

"By just revealing what he has in this workaround, it definitely is a very strong starting point for any malicious hacker... to try and understand the vulnerability and produce an exploit," Harris said. "Yes, we are clearly disappointed that he felt the need to say anything about this vulnerability before we had a patch available."

 


 

 
��  
 
 
Oracle Training at Sea
 
 
 
 
oracle dba poster
 

 
Follow us on Twitter 
 
Oracle performance tuning software 
 
Oracle Linux poster
 
 
 

 

Burleson is the American Team

Note: This Oracle documentation was created as a support and Oracle training reference for use by our DBA performance tuning consulting professionals.  Feel free to ask questions on our Oracle forum.

Verify experience! Anyone considering using the services of an Oracle support expert should independently investigate their credentials and experience, and not rely on advertisements and self-proclaimed expertise. All legitimate Oracle experts publish their Oracle qualifications.

Errata?  Oracle technology is changing and we strive to update our BC Oracle support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:  

and include the URL for the page.


                    









Burleson Consulting

The Oracle of Database Support

Oracle Performance Tuning

Remote DBA Services


 

Copyright © 1996 -  2017

All rights reserved by Burleson

Oracle ® is the registered trademark of Oracle Corporation.

Remote Emergency Support provided by Conversational