Oracle has issued a security alert and software patches for a set of serious vulnerabilities in the security protocols used by some of its server products.
The flaws affect certain versions of Oracle's 8i and 9i Database Server, Oracle 9i Application Server, and versions 8 and 9 of the Oracle HTTP Server, according to the alert, which is dated December 4.
Any client that can access an affected Oracle server could exploit the vulnerabilities, according to the alert, which characterizes users' risk of exposure from the vulnerability as "high." Oracle "strongly recommends" that users apply patches for these vulnerabilities and said there were no alternate workarounds to correct the issues.
Exploiting the Holes
The flaws exploit the ASN.1 (Abstract Syntax Notation 1) syntax notation that is used by the SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols, which are widely used for exchanging data securely on the Internet.
"A lot of the problems have to do with the way that ASN.1 handles purposefully badly constructed data," says Art Manion, an Internet security analyst with Carnegie Mellon's CERT Coordination Center in Pittsburgh, Pennsylvania.
By submitting data that was "purposefully badly constructed," a malicious client could theoretically gain control over certain servers running SSL or TLS software, Manion says. "In a worst case scenario, a malicious client, using a specially crafted client certificate, could execute arbitrary code on a vulnerable server," he says.
Though the exploit is technically possible it has not yet been used by attackers, Manion says. "These vulnerabilities aren't so dead easy to exploit," he says.
The vulnerabilities were originally discovered by researchers at London's National Infrastructure Security Coordination Center and then documented in a CERT advisory on October 1, 2003, Manion says.
Oracle could have reduced the risk presented by these bugs had it removed certain features from the OpenSSL software libraries included with its servers, according to Thor Larholm, a senior security researcher with PivX Solutions, a network security consultancy based in Newport Beach, California.
"Oracle ... should have done more to tailor the available functionality in the libraries they included, as some of the vulnerabilities in OpenSSL which Oracle subsequently became vulnerable to [are] not even used by Oracle itself," he says.
The vulnerabilities have affected a wide variety of software that employs the SSL and TLS protocols, including Oracle's, he says.
An Oracle spokesperson was unavailable for comment. The company's security alert can be found online.