Overview
The Oracle JInitiator ActiveX control contains multiple stack buffer overflows, which could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Oracle JInitiator allows users to run Oracle Developer Server applications within a web browser. Oracle JInitiator includes an ActiveX control called beans.ocx. The Oracle JInitiator ActiveX control is vulnerable to multiple stack buffer overflows in initialization parameters. This vulnerability appears to be present in versions 1.1.8.x through 1.1.8.26 of the Oracle JInitiator software. In our testing, the 1.3.1.x versions of JInitiator do not contain these buffer overflows. However, installing a later version of the software will not remove the vulnerable version of the control. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system with privileges of the user. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2008.html
- http://blogs.oracle.com/schan/2007/12/27
- http://www.oracle.com/technology/software/products/developer/files/11816/readme.htm
- http://www.oracle.com/technology/software/products/developer/htdocs/jinit.htm
- http://www.integrigy.com/security-resources/analysis/integrigy-oracle-jinitiator-vulnerability.pdf/view
- http://www.securityfocus.com/bid/25473
- http://secunia.com/advisories/26644/
Acknowledgements
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann. Additional information was provided by Stephen Kost of Integrigy.
Other Information
CVE IDs: | CVE-2007-4467 |
Severity Metric: | 5.89 |
Date Public: | 2007-08-28 |
Date First Published: | 2007-08-28 |
Date Last Updated: | 2009-04-13 17:16 UTC |
Document Revision: | 21 |