Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Unix :: General :: oracle21.htm

Oracle 8.1.7 oidldapd write permission checking error



Vulnerability

    oidldapd

Affected

    oidldapd in Oracle 8.1.7

Description

    Following  is  based  on  a  Plazasite  Security  Advisory by Juan
    Manuel Pascual Escriba.  oidldapd is a Oracle Internet  Directory.
    Oracle Ldap Daemon.  The actual version is 2.1.1.1

    There is a write permision checking error in oidldapd that can  be
    used by local users to write any file in local machine.  Any  user
    with local access, can write any file.

    This Feature seems to be  new with oidldapd in OID  2.1.1.1/8.1.7.
    We couldn't reproduce  it with oidldapd  in OID 2.0.6.3  and seems
    to be very dangerous.  Look at this.  In tested system occurs  the
    next:

        my ORACLE_HOME=/work/oracle8ir3

        oracle@dimoniet bin]$ cd /work/oracle8ir3/ldaplog
        oracle@dimoniet log]$ ls -alc
        total 12
        drwxr-xrwx    2    oracle    orainstall    4096    Dec    12 05:03 .
        drwxr-xrwx   13    oracle    orainstall    4096    Dec    10 18:50 ..

    Ok .. nothing in logs ... lets go to execute oidldapd.

        oracle@dimoniet log]$ /work/oracle8ir3/bin/oidldapd
        oracle@dimoniet log]$ ls -alc
        total 12
        drwxr-xrwx    2    oracle   orainstall    4096    Dec    12 05:03 .
        drwxr-xrwx    13   oracle   orainstall    4096    Dec    10 18:50 ..
        -rw-r--r--    1    root     orainstall      86    Dec    12 05:26 oidldapd00.log

    Ups ... owned by root ? ...  no comment about .. what about ln  -s
    /vmlinuz ./oidldapd00.log?  Or shared libraries?

Solution

    Oracle  recommends   that  customers   implement  the    following
    workaround:  change the file permissions to 710 on the  'oidldapd'
    and 'oidmon' executables.  These permissions will limit access (to
    the executables) to a small, privileged group of users on the host
    machine.

    Oracle has comprehensively fixed these vulnerabilities in the  OID
    2.0, Release 2.0.6.3, patch set on Solaris and in the  forthcoming
    OID 2.1, Release 2.1.1.1, patch set.  The OID 2.0.6.3 patch set is
    available on  Metalink, Oracle's  Support Services  site.   Oracle
    intends to produce this patch on additional platforms as well.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH