Even as admins scrambled to patch numerous critical flaws in Oracle products today, some noted that fixes were unavailable for many other serious and well-known flaws -- among them one in Oracle Forms detailed in a paper also released today.
The company noted more than 89 security vulnerabilities -- many of them cumulative -- in its new threat matrix that measures the ease of exploitability and its impact. Oracle said the supported product releases and versions affected include:
- Oracle Database 10g Release 1, versions 10.1.0.2, 10.1.0.3, 10.1.0.3.1, 10.1.0.4 (10.1.0.3.1 is supported for Oracle Application Server only);
- Oracle9i Database Server Release 2, versions 126.96.36.199, 188.8.131.52;
- Oracle9i Database Server Release 1, versions 184.108.40.206, 220.127.116.11, 9.0.4 (18.104.22.168 FIPS) (all of which are supported for Oracle Application Server only);
- Oracle8i Database Server Release 3, version 22.214.171.124;
- Oracle Application Server 10g Release 2 (10.1.2);
- Oracle Application Server 10g (9.0.4), versions 126.96.36.199, 188.8.131.52;
- Oracle9i Application Server Release 2, versions 184.108.40.206, 220.127.116.11;
- Oracle9i Application Server Release 1, version 18.104.22.168;
- Oracle Collaboration Suite Release 2, versions 22.214.171.124, 126.96.36.199;
- Oracle E-Business Suite and Applications Release 11i, versions 11.5.0 through 11.5.10;
- Oracle E-Business Suite and Applications Release 11.0;
- Oracle Enterprise Manager Grid Control 10g, versions 10.1.0.2, 10.1.0.3;
- Oracle Enterprise Manager versions 188.8.131.52, 184.108.40.206;
- PeopleSoft EnterpriseOne Applications, versions 8.9 SP2 and 8.93;
- PeopleSoft OneWorldXe/ERP8 Applications, versions SP22 and higher.
However, one expert noted that many flaws weren't addressed in the patch, including a SQL injection vulnerability in default installations of Oracle Forms found by bug researcher Alex Kornburst. "None of the 40 outstanding security bugs he has reported have been fixed, quite a large portion of which have been reported for more than a year," said Pete Finnigan, an Oracle expert and author of Oracle Security Step By Step - A survival guide for Oracle security. Finnigan also noted that researcher Esteban MartÍnez Fayo is credited with some fixes in this advisory but in a recent paper he stated that Oracle still needs to fix more than 65 buffer overflows that he has reported.
"The number of bugs some researchers say they have reported and that are not fixed for quite considerable lengths of time is worrying," Finnigan added. "I hope that Oracle is becoming proactive in fixing bugs quicker rather than [allowing] researchers to advertise larger and larger lists of unfixed Oracle bugs on their sites. How many know of these unfixed bugs and are exploiting them already?"