Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:9149
HistoryJul 13, 2005 - 12:00 a.m.

Oracle Forms Insecure Temporary File Handling

2005-07-1300:00:00
vulners.com
10

Name Oracle Forms Insecure Temporary File Handling
Systems Affected Oracle Forms 4.5, 6.0, 6i, 9i
Severity Medium Risk
Category Information disclosure
Vendor URL http://www.oracle.com
Author Alexander Kornbrust (ak at red-database-security.com)
Date 13 July 2005 (V 1.00)
Advisory AKSEC2003-006
Oracle Vuln# AS04
Time to fix 693 days

Details
If the number of records in a Oracle Forms application retrieved from the database exceeds the parameter "buffered records" Oracle Forms will create a temp file located in the temp directory of the application server. This temp file contains an unencrypted copy of the database table used in the Forms application (e.g. creditcard). The default permission for these temp files (format: AAAa<processid>.TMP) is -rw-rw-r–. Every UNIX user on the application server can read the content of this file (e.g credit card information, …).

Example
ls -la /tmp
-rw-rw-r-- 1 oracle oinstall 47600 Aug 17 20:30 AAAa15400.TMP

Workaround
Set the environment variable TMP, TEMP and TMPDIR to a secure location. It depends on the OS of the application server what environment variable will be used.
Delete old AAA* files on a regular basis.

Patch Information
Apply patches for the application server mentioned in Metalink Note 311038 .

History
19-aug-2003 Oracle secalert was informed
20-aug-2003 Bug confirmed
12-jul-2005 Oracle published Oracle Critical Patch Update July 2005
13-jul-2005 Red-Database-Security published this advisory