ID

VAR-200904-0429


CVE

CVE-2009-1009


TITLE

Oracle Application Server of Outside In Technology Component vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-001239

DESCRIPTION

Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.1.9 allows local users to affect confidentiality, integrity, and availability, related to HTML. Oracle has released the April 2009 critical patch update that addresses 43 vulnerabilities affecting the following software: Oracle Database Oracle Audit Vault Oracle Application Server Oracle Outside In SDK HTML Export Oracle XML Publisher Oracle BI Publisher Oracle E-Business Suite PeopleSoft Enterprise PeopleTools PeopleSoft Enterprise HRMS Oracle WebLogic Server (formerly BEA WebLogic Server) Oracle Data Service Integrator Oracle AquaLogic Data Services Platform Oracle JRockit. Oracle Outside In is prone to multiple buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied input. An attacker can exploit these issue by tricking a victim into opening a specially crafted file with an application using the affected library. Successful exploits will allow arbitrary code to run in the context of the user running the affected application. NOTE: These issues were previously covered in BID 34461 (Oracle April 2009 Critical Patch Update Multiple Vulnerabilities), but have been given their own record to better document them. ---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. For more information see vulnerability #6 through #9 in: SA34693 SOLUTION: The vendor recommends to delete the GdFileConv.exe file. See vendor's advisory for additional details. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 iDefense Security Advisory 05.14.09 http://labs.idefense.com/intelligence/vulnerabilities/ May 14, 2009 I. BACKGROUND Oracle Corp.'s Outside In Technology is a document conversion engine supporting a large number of binary file formats. Prior to Oracle's acquisition, the software was maintained by Stellent Inc. The software appears to have originated from "QuickView" for Windows 98, but later spun off. It is used by various software packages, one of which is Motorola Inc.'s Good Mobile Messaging Server. For more information, visit the vendors' sites at the URLs provided below. http://www.oracle.com/technology/products/content-management/oit/oit_all.html http://www.good.com/corp/index.php II. DESCRIPTION Remote exploitation of multiple buffer overflow vulnerabilities in Oracle Corp.'s Outside In Technology, as included in various vendors' software distributions, allow attackers to execute arbitrary code. Two vulnerabilities exist due to a lack of bounds checking when processing specially crafted Microsoft Excel spreadsheet files. The two issues exist in two distinct functions. The two vulnerabilities are nearly identical, with the differentiating factor being the value of a flag bit within a record of the file. If the bit is set, the code path to the first vulnerable function is taken. Otherwise, the code path to the second vulnerable function is taken. The cause of the vulnerability is the same in each case. An array of structures, stored on the stack, is manipulated in a loop without validating the bounds of the array. By crafting a file containing a properly malformed record, it is possible to write outside the bounds of this array. The resulting stack corruption can lead to arbitrary code execution. III. ANALYSIS Exploitation of these vulnerabilities allows attackers to execute arbitrary code. In order to exploit these vulnerabilities, the attacker must somehow supply a malformed document to an application that will process the document with Outside In Technology. Likewise, the privileges gained will also depend on the software using the library. In the case of Good Mobile Messaging Server, an attacker can send an electronic mail message with an Excel spreadsheet attachment to a user. When the user chooses to view the spreadsheet, the vulnerable condition will be triggered. Upon successful exploitation, the attacker will gain the privileges of the "GoodAdmin" user. This is a special user account which, in some configurations, may be a member of the "Administrator" group. Regardless of the user's "Administrator" status, the user will always have full privileges to "Read" and "Send As" all users on the Microsoft Exchange server. This could allow an attacker to conduct further social engineering attacks. Other software packages using Outside In were not investigated. IV. DETECTION iDefense confirmed the existence of these vulnerabilities using the follow versions of Outside In on Windows Server 2003 SP2. 8.1.5.4282 8.1.9.4417 8.2.2.4866 8.3.0.5129 Additionally the following versions of Good Mobile Messaging Server for Exchange ship with vulnerable versions of vsxl5.dll. 4.9.3.41 5.0.4.28 6.0.0.106 All versions of Outside In, including versions for operating systems other than Windows, are assumed to be vulnerable. Additionally, all software that includes or uses Outside In is assumed to be vulnerable. Earlier versions, including those branded with other names, are vulnerable as well. V. WORKAROUND In order to prevent exploitation of this vulnerability, iDefense recommends using file system access control lists (ACLs) to prevent reading the affected module. For Good Mobile Messaging Server, Good Software recommends deleting the GdFileConv.exe file and restarting the Messaging Server. VI. VENDOR RESPONSE Oracle has released a patch which addresses this issue. For more information, consult their advisory at the following URL: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html Good Technology has released a patch which addresses this issue. For more information, consult their advisory at the following URL: http://www.good.com/faq/18431.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-1009 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/30/2009 - GoodLink contact identified 01/30/2009 - Security contact research begins 02/05/2009 - Oracle contact identified 02/09/2009 - Initial Oracle Reply 02/09/2009 - Initial Vendor Notification 02/10/2009 - Initial GoodLink Reply 02/11/2009 - Oracle validation 02/16/2009 - GoodLink customer alert sent 02/16/2009 - GoodLink validation 02/19/2009 - Oracle requests PoC 02/19/2009 - PoC sent to Oracle 02/25/2009 - GoodLink status update 02/27/2009 - Oracle status update 03/06/2009 - GoodLink status update 04/14/2009 - Oracle patch released 05/13/2009 - CVE Corelation requested from Oracle 05/14/2009 - Coordinated Public Disclosure 05/14/2009 - GoodLink ready for disclosure coordinated with iDefense IX. CREDIT This vulnerability was discovered by Joshua J. Drake, iDefense Labs. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2009 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFKDc+jbjs6HoxIfBkRAvY9AJ9WjWSDZK8tmiaAo5tLkrRZrDDscwCeJ8qk 0aG0K5EpST6rBQF7jgOIhC8= =94Xc -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . I. The document provides information about affected components, access and authorization required for successful exploitation, and the impact from the vulnerabilities on data confidentiality, integrity, and availability. If significant additional details about vulnerabilities and remediation techniques become available, we will update the Vulnerability Notes Database. Impact The impact of these vulnerabilities varies depending on the product, component, and configuration of the system. Potential consequences include the execution of arbitrary code or commands, information disclosure, and denial of service. Vulnerable components may be available to unauthenticated, remote attackers. An attacker who compromises an Oracle database may be able to access sensitive information. Note that this document only lists newly corrected issues. Updates to patches for previously known issues are not listed. Please send email to <cert@cert.org> with "TA09-105A Feedback VU#955892" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Upon entering the vulnerable function, data is copied from a heap buffer into a stack buffer without ensuring that the data will fit. It is interesting to note that this vulnerability was fixed some time between the release of version 8.1.5 and version 8.1.9. No public record exists documenting the existence of this vulnerability. iDefense confirmed that the following versions are not affected: 8.1.9.4417 (shipped with GMMS 5.0.4.28 and GMMS 6.0.0.106) 8.2.2.4866 8.3.0.5129 V. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Some have unknown impacts, others can be exploited by malicious users to conduct SQL injection attacks or disclose sensitive information, and by malicious people compromise a vulnerable system. 1) A format string error exists within the Oracle Process Manager and Notification (opmn) daemon, which can be exploited to execute arbitrary code via a specially crafted POST request to port 6000/TCP. 2) Input passed to the "DBMS_AQIN" package is not properly sanitised before being used. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) An error in the Application Express component included in Oracle Database can be exploited by unprivileged database users to disclose APEX password hashes in "LOWS_030000.WWV_FLOW_USER". The remaining vulnerabilities are caused due to unspecified errors. PROVIDED AND/OR DISCOVERED BY: 1) Joxean Koret of TippingPoint 2, 3) Alexander Kornbrust of Red Database Security The vendor also credits: * Joshua J. * Esteban Martinez Fayo of Application Security, Inc. * Franz Huell of Red Database Security; * Mike Janowski of Neohapsis, Inc. * Joxean Koret * David Litchfield of NGS Software * Tanel Poder * Sven Vetter of Trivadis * Dennis Yurichev ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html ZDI: http://www.zerodayinitiative.com/advisories/ZDI-09-017/ Red Database Security: http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html http://www.red-database-security.com/advisory/apex_password_hashes.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2009-1009 // JVNDB: JVNDB-2009-001239 // BID: 34461 // BID: 34994 // PACKETSTORM: 77574 // PACKETSTORM: 77567 // PACKETSTORM: 76710 // PACKETSTORM: 77566 // PACKETSTORM: 76704

AFFECTED PRODUCTS

vendor:oraclemodel:application serverscope:eqversion:8.1.9

Trust: 1.8

vendor:ibmmodel:websphere portalscope:eqversion:8.0.0.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:6.0.1.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:6.1.5.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:6.0.0.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:7.0.0.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:6.1.0.0

Trust: 1.6

vendor:ibmmodel:websphere portalscope:eqversion:6.0.1

Trust: 0.8

vendor:ibmmodel:websphere portalscope:ltversion:6.0.0

Trust: 0.8

vendor:ibmmodel:websphere portalscope:ltversion:6.1.5

Trust: 0.8

vendor:ibmmodel:websphere portalscope:ltversion:6.1.0

Trust: 0.8

vendor:ibmmodel:websphere portalscope:ltversion:8

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.1.5.3 cf27

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:7.0.0.2 cf25

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:8.0.0.1 cf08

Trust: 0.8

vendor:ibmmodel:websphere portalscope:ltversion:7

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.1.0.6 cf27

Trust: 0.8

vendor:ibmmodel:websphere portalscope:eqversion:6.0.0.1

Trust: 0.8

vendor:oraclemodel:outside in sdk html exportscope:eqversion:8.3

Trust: 0.6

vendor:oraclemodel:outside in sdk html exportscope:eqversion:8.2.2

Trust: 0.6

vendor:oraclemodel:jrockit r27.1.0scope: - version: -

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:5.6.2

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic portal sp1scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle9i personal edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.49

Trust: 0.3

vendor:oraclemodel:oracle11g standard edition onescope:eqversion:11.16

Trust: 0.3

vendor:oraclemodel:data service integratorscope:eqversion:10.3

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.3

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:10.1.3.2.1

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.3.0

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.8.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic portal sp6scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:xml publisherscope:eqversion:10.1.3.2

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.16

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.5

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:oraclemodel:oracle11g enterprise editionscope:eqversion:11.1.0.7

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:10.0

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.2scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:beamodel:systems weblogic portal sp2scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:beamodel:systems weblogic portal sp5scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:10.3

Trust: 0.3

vendor:beamodel:systems weblogic portal sp3scope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic portalscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.1

Trust: 0.3

vendor:beamodel:systems weblogic server maintenance packscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.8

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:oraclemodel:oracle9i standard edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.3

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise edition .8dvscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.5

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.0

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise hrmsscope:eqversion:9.0

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.3.2

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.10.2

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.16

Trust: 0.3

vendor:beamodel:systems weblogic server mp1scope:eqversion:10.0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise hrmsscope:eqversion:8.9

Trust: 0.3

vendor:oraclemodel:audit vaultscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:beamodel:systems weblogic portal sp4scope:eqversion:8.1

Trust: 0.3

vendor:oraclemodel:bi publisherscope:eqversion:10.1.3.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:oraclemodel:weblogic serverscope:eqversion:10.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:oraclemodel:e-business suitescope:eqversion:12.0.6

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.0.4

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.8

Trust: 0.3

vendor:oraclemodel:oracle11g standard editionscope:eqversion:11.16

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:beamodel:systems weblogic server sp7scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:aqualogic data services platformscope:eqversion:3.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

vendor:oraclemodel:outside inscope:eqversion:8.3.0.5129

Trust: 0.3

vendor:oraclemodel:outside inscope:eqversion:8.2.2.4866

Trust: 0.3

vendor:oraclemodel:outside inscope:eqversion:8.1.9.4417

Trust: 0.3

vendor:oraclemodel:outside inscope:eqversion:8.1.5.4282

Trust: 0.3

vendor:goodmodel:mobile messaging server for exchangescope:eqversion:6.0.0.106

Trust: 0.3

vendor:goodmodel:mobile messaging server for exchangescope:eqversion:5.0.4.28

Trust: 0.3

vendor:goodmodel:mobile messaging server for exchangescope:eqversion:4.9.3.41

Trust: 0.3

sources: BID: 34461 // BID: 34994 // JVNDB: JVNDB-2009-001239 // CNNVD: CNNVD-200904-326 // NVD: CVE-2009-1009

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1009
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-1009
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200904-326
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2009-1009
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-001239 // CNNVD: CNNVD-200904-326 // NVD: CVE-2009-1009

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2009-1009

THREAT TYPE

network

Trust: 0.6

sources: BID: 34461 // BID: 34994

TYPE

Unknown

Trust: 0.6

sources: BID: 34461 // BID: 34994

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001239

PATCH

title:cpuapr2009url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

Trust: 0.8

title:1660640url:http://www-01.ibm.com/support/docview.wss?uid=swg21660640

Trust: 0.8

title:1660774url:http://www-01.ibm.com/support/docview.wss?uid=swg21660774

Trust: 0.8

title:090417_86url:http://www.oracle.com/technology/global/jp/security/090417_86/top.html

Trust: 0.8

title:TA09-105Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta09-105a.html

Trust: 0.8

sources: JVNDB: JVNDB-2009-001239

EXTERNAL IDS

db:NVDid:CVE-2009-1009

Trust: 3.2

db:SECUNIAid:34693

Trust: 2.6

db:USCERTid:TA09-105A

Trust: 2.5

db:SECTRACKid:1022055

Trust: 2.4

db:OSVDBid:53748

Trust: 2.4

db:BIDid:34461

Trust: 1.3

db:VUPENid:ADV-2009-1042

Trust: 0.8

db:JVNDBid:JVNDB-2009-001239

Trust: 0.8

db:CERT/CCid:TA09-105A

Trust: 0.6

db:CNNVDid:CNNVD-200904-326

Trust: 0.6

db:ZDIid:ZDI-09-017

Trust: 0.4

db:BIDid:34994

Trust: 0.3

db:SECUNIAid:35135

Trust: 0.1

db:PACKETSTORMid:77574

Trust: 0.1

db:PACKETSTORMid:77567

Trust: 0.1

db:PACKETSTORMid:76710

Trust: 0.1

db:PACKETSTORMid:77566

Trust: 0.1

db:PACKETSTORMid:76704

Trust: 0.1

sources: BID: 34461 // BID: 34994 // JVNDB: JVNDB-2009-001239 // PACKETSTORM: 77574 // PACKETSTORM: 77567 // PACKETSTORM: 76710 // PACKETSTORM: 77566 // PACKETSTORM: 76704 // CNNVD: CNNVD-200904-326 // NVD: CVE-2009-1009

REFERENCES

url:http://osvdb.org/53748

Trust: 2.4

url:http://secunia.com/advisories/34693

Trust: 2.4

url:http://www.securitytracker.com/id?1022055

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta09-105a.html

Trust: 2.4

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

Trust: 2.1

url:http://www.securityfocus.com/bid/34461

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html

Trust: 1.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21660640

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1009

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-105a/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-11/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1009

Trust: 0.8

url:http://www.vupen.com/english/advisories/2009/1042

Trust: 0.8

url:http://www.oracle.com

Trust: 0.6

url:http://www.good.com/faq/18431.html

Trust: 0.6

url:http://www.zerodayinitiative.com/advisories/zdi-09-017/

Trust: 0.4

url:http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html

Trust: 0.4

url:http://www.red-database-security.com/advisory/apex_password_hashes.html

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=798

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=801

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=800

Trust: 0.4

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=799

Trust: 0.4

url:http://secunia.com/secunia_research/2009-23/

Trust: 0.3

url:http://secunia.com/secunia_research/2009-22/

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2009-03.shtml

Trust: 0.3

url:/archive/1/502845

Trust: 0.3

url:/archive/1/502707

Trust: 0.3

url:/archive/1/502697

Trust: 0.3

url:/archive/1/502727

Trust: 0.3

url:/archive/1/502723

Trust: 0.3

url:/archive/1/506160

Trust: 0.3

url:/archive/1/502724

Trust: 0.3

url:/archive/1/502683

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1001.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1002.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1003.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1004.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1005.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1006.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1012.html

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/wls-security/1016.html

Trust: 0.3

url:http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html

Trust: 0.3

url:/archive/1/503487

Trust: 0.3

url:/archive/1/503622

Trust: 0.3

url:/archive/1/503625

Trust: 0.3

url:/archive/1/503624

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/34693/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://www.good.com/corp/index.php

Trust: 0.2

url:http://enigmail.mozdev.org

Trust: 0.2

url:http://cve.mitre.org/),

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.2

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.2

url:http://www.oracle.com/technology/products/content-management/oit/oit_all.html

Trust: 0.2

url:http://labs.idefense.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-1009

Trust: 0.2

url:http://secunia.com/advisories/35135/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-105a.html>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/alerts.htm>

Trust: 0.1

url:http://www.oracle.com/technology/deploy/security/pdf/public_vuln_to_advisory_mapping.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

sources: BID: 34461 // BID: 34994 // JVNDB: JVNDB-2009-001239 // PACKETSTORM: 77574 // PACKETSTORM: 77567 // PACKETSTORM: 76710 // PACKETSTORM: 77566 // PACKETSTORM: 76704 // CNNVD: CNNVD-200904-326 // NVD: CVE-2009-1009

CREDITS

Esteban Martinez Fayo Joxean Koret joxeankoret@yahoo.es

Trust: 0.6

sources: CNNVD: CNNVD-200904-326

SOURCES

db:BIDid:34461
db:BIDid:34994
db:JVNDBid:JVNDB-2009-001239
db:PACKETSTORMid:77574
db:PACKETSTORMid:77567
db:PACKETSTORMid:76710
db:PACKETSTORMid:77566
db:PACKETSTORMid:76704
db:CNNVDid:CNNVD-200904-326
db:NVDid:CVE-2009-1009

LAST UPDATE DATE

2024-11-23T19:44:24.327000+00:00


SOURCES UPDATE DATE

db:BIDid:34461date:2009-09-01T16:22:00
db:BIDid:34994date:2009-05-19T19:20:00
db:JVNDBid:JVNDB-2009-001239date:2014-02-21T00:00:00
db:CNNVDid:CNNVD-200904-326date:2009-04-28T00:00:00
db:NVDid:CVE-2009-1009date:2024-11-21T01:01:27.220

SOURCES RELEASE DATE

db:BIDid:34461date:2009-04-09T00:00:00
db:BIDid:34994date:2009-04-09T00:00:00
db:JVNDBid:JVNDB-2009-001239date:2009-05-20T00:00:00
db:PACKETSTORMid:77574date:2009-05-18T15:35:49
db:PACKETSTORMid:77567date:2009-05-16T18:48:21
db:PACKETSTORMid:76710date:2009-04-15T23:15:44
db:PACKETSTORMid:77566date:2009-05-16T18:46:42
db:PACKETSTORMid:76704date:2009-04-15T15:08:54
db:CNNVDid:CNNVD-200904-326date:2009-04-15T00:00:00
db:NVDid:CVE-2009-1009date:2009-04-15T10:30:00.967