Holy shit, it's 2018 2019 2020 2021 2022 2023 2024, and the US isn't a fascist country! What a time to be alive.
0 Members and 1 Guest are viewing this topic.
Whilst looking over old Oracle bugs I discovered that a _fully_ _patched_8.1.7.4 Oracle server is still vulnerable to the old extproc flaw[http://www.ngssoftware.com/advisories/oraplsextproc.txt]; this flaw, whenexploited, allows a remote attacker without a userID and password to takecontrol of the server. Why, you may ask, has a supported product gone for solong without a patch for a serious problem that was made public 3 years and10 months ago and reported to Oracle over 4 years ago? The answer, accordingto Alert 57[http://www.oracle.com/technology/deploy/security/pdf/2003alert57.pdf], isthat Oracle outright decided not to fix it. They claim "architecturalconstraints" are the problem even though they managed to overcome these sameconstraints on newer versions of Oracle. Users of 8.1.7.4 would do well to heed the advice offered in Alert 57 ifthey've not already done so.Cheers,David Litchfieldhttp://www.databasesecurity.com/http://www.ngssoftware.com/More commentary on this available herehttp://www.databasesecurity.com/oracle-commentary.htm