Korean
<< Back
VID 25048
Severity 30
Port 1521, ...
Protocol TCP
Class DB
Detailed Description The Oracle Database server, according to its version number, has multiple directory traversal vulnerabilities. Oracle8i and 9i Database servers are vulnerable to multiple directory traversal vulnerabilities that may allow a remote authenticated attacker to read, write, or rename arbitrary files with the privileges of the Oracle Database server. These vulnerabilities are reported to exist due to a lack of sufficient input validation performed on filenames and paths passed to file processing functions, and may allow a malicious SQL query to traverse outside of a directory that is described in an Oracle directory object.

* Note: This check solely relied on the version number of the remote Oracle Database server to assess this vulnerability, so this might be a false positive.

* References:
http://securityfocus.com/archive/1/392527
http://www.argeniss.com/research/ARGENISS-ADV-030501.txt
http://www.petefinnigan.com/directory_traversal.pdf
http://www.oracle.com/technology/deploy/security/pdf/cpu-jan-2005_advisory.pdf

* Platforms Affected:
Oracle Corporation, Oracle8i Database Server Any version
Oracle Corporation, Oracle9i Database Server Any version
Microsoft Windows Any version
Linux Any version
Unix Any version
Recommendation Oracle has released a Critical Patch Update to address these issues. Information regarding obtaining and applying an appropriate patch can be found in the Oracle Critical Patch Update Advisory dated January 2005 at http://www.oracle.com/technology/deploy/security/pdf/cpu-jan-2005_advisory.pdf

-- OR --

As a workaround, restrict access to Directory Objects and UTL_FILE package.
Related URL (CVE)
Related URL 12749 (SecurityFocus)
Related URL (ISS)