TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Ellen K.
date: 2004-09-19 00:58:42
subject: Re: ORACLE exploit for Ellen

From: Ellen K. 

Looks like you're trying to make sure I read nthelp?   Which obviously I
haven't for several weeks?

Seriously, thanks.   :)

On Thu, 2 Sep 2004 15:00:18 -0400, "Geo."
 wrote in message :

>Researchers at NGSSoftware have discovered multiple critical vulnerabilities
>in Oracle Database Server and Oracle Application Server. Versions affected
>include
>Oracle Database 10g Release 1 Version 10.1.0.2
>Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5
>Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
>Oracle8i Database Server Release 3, version 8.1.7.4
>Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
>Oracle9i Application Server Release 2, versions 9.0.2.3 and 9.0.3.1
>Oracle9i Application Server Release 1, version 1.0.2.2
>The vulnerabilities range from buffer overflow issues, PL/SQL Injection,
>trigger abuse, character set conversion bugs and denial of service. On the
>31st of August 2004 Oracle released a set of patches to address all of these
>issues (and for other flaws found by other researchers.) This patch set can
>be downloaded from the Metalink website - http://metalink.oracle.com/.
>NGSSoftware are going to withhold details about these flaws for three
>months. Full details will be published on the 31st of November 2004. This
>three month window will allow Oracle database administrators the time needed
>to test and apply the patch set before the details are released to the
>general public. This reflects NGSSoftware's new approach to responsible
>disclosure.
>NGSSQuirreL for Oracle, NGSSoftware's advanced vulnerability assessment
>scanner and security manager for Oracle, has been updated to check for and
>positively identify these flaws in Oracle database servers on the network.
>More information about NGSSQuirreL for Oracle can be found at
>http://www.nextgenss.com/squirrelora.htm.
>NGSSoftware Insight Security Research
>http://www.nextgenss.com/
>+44(0)208 401 0070
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 396/45 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.