Check Point Reference: | CPAI-2011-074 |
Date Published: | 13 Mar 2011 |
Severity: | Critical |
Last Updated: | Monday 03 December, 2018 |
Source: | |
Industry Reference: | CVE-2010-4416 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Oracle GoldenGate Veridata is a high-speed, low-impact data comparison solution that identifies and reports on data discrepancies between databases without interrupting ongoing business processes. The application provides details on tables, rows, and columns that are persistently out of sync, aiding users to research root causes and determine how to manage data replication. A buffer overflow vulnerability has been reported in Oracle GoldenGate Veridata Server. The vulnerability is due to a boundary error in Oracle GoldenGate Veridata Server while parsing XML SOAP requests containing an overly long tag string. A remote attacker could exploit this issue by sending a crafted SOAP request to the target server. Successful exploitation of this vulnerability may allow execution of arbitrary code on a vulnerable system and may terminate the service abnormally causing a Denial of Service condition. |
This protection will detect and block crafted SOAP requests containing an overly long tag string sent to the vulnerable server.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Oracle Protection Violation.
Attack Information: Oracle GoldenGate Veridata Server XML SOAP request buffer overflow