Covert Labs Warns Of Oracle 8i Vulnerabilities - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Covert Labs Warns Of Oracle 8i Vulnerabilities

Covert Labs warns Oracle8i users of two vulnerabilities that could compromise systems and allow a network intrusion or denial-of-service attack.

PGP Security's Covert Labs is warning Oracle 8i users of two vulnerabilities that, if exploited, could seriously compromise systems and data and allow a network intrusion and a denial-of-service attack.

"This is not trivial; this would rank up there as the sort of thing you don't want to let sit around," warns Jim Magdych, security research manager for PGP Security, a unit of Network Associates Inc. Covert Labs labeled a vulnerability it found in the Oracle 8i Transparent Network Substrate Listener, which establishes remote communications with Oracle database services. According to Covert, if the correct buffer overflow condition is created by a hacker, arbitrary code can be executed that would hand over full control of the database services to the attacker. In some instances, attackers can gain full control of the operating system. Covert warns that since the buffer overflow occurs before any security authorization, the TNS Listener is vulnerable despite password protection.

This vulnerability applies to Oracle 8i Standard and Enterprise Editions version 8.1.5, 8.1.6, 8.1.7 and previous versions for Windows, Linux, Solaris, AIX, HP-UX, and Tru64 Unix, says Covert. Oracle has issued a patch, with bug number 1489683, which can be found at

A second, medium-risk vulnerability in the Oracle implementation of the TNS over net* (SQLNet) protocol permits a denial-of-service attack, launched by a remote attacker, against any Oracle server relying on the protocol, including the TNS Listener, Oracle Name Service, and Oracle ConnectionsManager. This vulnerability also applies to Oracle 8i Standard and Enterprise Editions version 8.1.5, 8.1.6, 8.1.7 and all previous versions for Windows, Linux, Solaris, AIX, HP-UX, and Tru64 Unix. Oracle has also posted a patch for this vulnerability, with bug number 1656431, at

Magdych predicts companies will take this vulnerability seriously. "A database vulnerability is a little different than a Web server vulnerability that allows a defacement. Companies store a lot of sensitive information on these databases; allowing someone to read or modify that information is not something to be taken lightly."

More information on both vulnerabilities can be found at

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
10 Ways to Transition Traditional IT Talent to Cloud Talent
Lisa Morgan, Freelance Writer,  11/23/2020
Top 10 Data and Analytics Trends for 2021
Jessica Davis, Senior Editor, Enterprise Apps,  11/13/2020
Can Low Code Measure Up to Tomorrow's Programming Demands?
Joao-Pierre S. Ruth, Senior Writer,  11/16/2020
Register for InformationWeek Newsletters
Current Issue
Why Chatbots Are So Popular Right Now
In this IT Trend Report, you will learn more about why chatbots are gaining traction within businesses, particularly while a pandemic is impacting the world.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll