Is Oracle Downplaying Security Vulnerabilities? - InformationWeek
IoT
IoT
News
News
10/20/2006
09:43 AM
50%
50%

Is Oracle Downplaying Security Vulnerabilities?

In its most recent 101-flaw patch, Oracle for the first time rated the severity of the threats using the Common Vulnerability Scoring System, a 10-point scale used by other vendors including Cisco. But the switch meant some of the scores were skewed, some researchers say.

Is Oracle playing the security spin game? Several researchers who reported vulnerabilities to the vendor during its latest software patch cycle think so.

As Oracle prepares to kick off its OpenWorld conference in San Francisco this week, the Redwood Shores, Calif.-based vendor is facing questions over the threat ratings it published for the 101 software vulnerabilities fixed last week in its quarterly patch release.

For the first time, Oracle rated the severity of the threats using the Common Vulnerability Scoring System (CVSS), a vendor-neutral 10-point threat rating scale that's designed to replace proprietary scoring systems and clarify the true impact of vulnerabilities. Cisco Systems, Qualys, Nessus and Skype are among the early adopters of CVSS.

By switching to the new system, Oracle said it was responding to customers who've been asking for clearer and more detailed information in the patch releases. Oracle also began indicating whether a vulnerability can be exploited remotely, whether authentication is required, and how difficult it is to exploit. Despite the move, security experts who Oracle credited with discovering the vulnerabilities say the CVSS scores the vendor assigned to the flaws are way too low.

"I have no doubt that Oracle is downplaying the seriousness of the vulnerabilities," said Esteban Martinez Fayo, a security researcher with New York-based vendor Application Security.

David Litchfield, managing director of U.K.-based Next Generation Security Software, says several of the 22 vulnerabilities in Oracle's Database productsmost of which address SQL injection or buffer overflow issuesshould have been given higher scores.

For example, Oracle rated a flaw in the SDO_3GL component of Oracle Database as 1.4 on a 10-point scale, and also indicated that a successful exploit of the vulnerability wouldn't compromise confidential data or affect the integrity of the database, according to Litchfield.

"This is nonsense," Litchfield said. "If an attacker can run arbitrary code as the Oracle user, an attacker can do whatever they want."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll