Oracle Patches 36 Bugs

Three of the fixes with the highest vulnerability rating are for the core Oracle Database Server itself.

Charles Babcock, Editor at Large, Cloud

October 21, 2009

3 Min Read

Oracle issued a small, critical security patch Tuesday with 36 bug fixes covering several elements of its product line, including Oracle E-Business Suite and J.D. Edwards applications and the WebLogic Application Server.

But for the first time, three of the fixes with the highest vulnerability rating, 10, were for the core Oracle Database Server itself. The ratings are set by a government, university and industry group as the Common Vulnerability Scoring System.

Oracle discloses the rating to DBA's to help them assess how quickly they need to address the fixes in the patch. The 10 rating indicated three of the fixes addressed security exploits that could be executed by a hacker at a remote location with no claim to a proper user authentication.

Three other fixes were for the database server, although their CVSS ratings were less severe at 6.5. The versions of the database server affected included Oracle 11g release; Oracle 10g Release 2, including the and releases; Oracle 10g Release; and Oracle 9i Release 2, including and

Oracle security patches are issued each quarter on the Tuesday closest to the 15th of the month. Oracle recognizes outsiders who contribute to the patches, and Tuesday's critical update recognized Aviv Pode, head of security research at security firm Sentrigo, and Yaniv Azaria, a researcher in the Application Defense Center lab of the security firm, Imperva.

Imperva CTO Amachai Shulman said Tuesday patch was a case of Oracle fixing for a second time a bug that Imperva discovered a year ago. One of the lower-rated vulnerabilities was exposed by Imperva last fall and Oracle announced a fix. The problem reappeared in Tuesday's critical patch as vulnerability CVE-2009-2001, which was labeled a medium risk at 6.5, under the CVSS ranking system. It is a PL/SQL exploit caused by a buffer overflow.

In some cases, a hacker using PL/SQL can enter instructions in a form by filling its underlying buffer beyond what the form requires. The database system, seeking the expected user entry, gets an instruction attacking the database instead.

Imperva "reported the problem a year ago," said Shulman. Oracle fixed the symptom "but not the root cause, leaving a way to successfully attack the database with a buffer overflow," he said in an interview. But this exposure was not subject to exploitation by a remote user lacking authentication, hence its 6.5 rating, he said.

"I don't think during the four years critical patches have been issued that any exposure to the databse server scored a ten. This time there were three of them," he said.

A rating of 10 from the Common Vulnerability Scoring System means it is in the "high" severity range of the ratings, with any rating between 7-10 considered high. Medium severity is rated at 4 -6.9 and low severity at 1-3.9. The CVSS system was set up by the National Institute of Standards and Technology, Carnegie Mellon University and security specialists in the computer industry. The group calls itself the Forum of Incident Response and Security Teams.

Oracle representatives could not be reached for comment.

InformationWeek Analytics has published a report on the 10 steps to effective data classification. Download the report here (registration required).

About the Author(s)

Charles Babcock

Editor at Large, Cloud

Charles Babcock is an editor-at-large for InformationWeek and author of Management Strategies for the Cloud Revolution, a McGraw-Hill book. He is the former editor-in-chief of Digital News, former software editor of Computerworld and former technology editor of Interactive Week. He is a graduate of Syracuse University where he obtained a bachelor's degree in journalism. He joined the publication in 2003.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like

More Insights