Eighteen flaws in Oracle's Outside In Technology also impact enterprise software products from other vendors Seventeen high-risk vulnerabilities out of the 276 flaws fixed by Oracle Tuesday affect products from third-party software vendors, including Microsoft. The vulnerabilities were found by researchers from Cisco’s Talos team and are located in the Oracle Outside In Technology (OIT), a collection of software development kits (SDKs) that can be used to extract, normalize, scrub, convert and view some 600 unstructured file formats. These SDKs, which are part of the Oracle Fusion Middleware, are licensed to other software developers who then use them in their own products. Such products include Microsoft Exchange, Novell Groupwise, IBM WebSphere Portal, Google Search Appliance, Avira AntiVir for Exchange, Raytheon SureView, Guidance Encase and Veritas Enterprise Vault. Oracle did not list the third-party products that are affected. However, an advisory from the CERT Coordination Center about several similar vulnerabilities in Oracle OIT that were patched in January comes with a long list of affected products from many large software vendors. It’s not clear how many of those products are also affected by the newly patched seventeen flaws, because some of them might not use all of the vulnerable SDKs or might include other limiting factors. Oracle assigned a score of 8.6 in the Common Vulnerability Scoring System (CVSS) to the flaws, which means a high severity rating. However, the score was calculated on the assumption that the affected software passes data received over a network directly to the vulnerable OIT code, which might not happen in all cases. Where this is true, attackers can exploit the flaws to execute rogue code on systems by sending specifically crafted content to applications using the vulnerable OIT SDKs. The Cisco researchers confirmed that Microsoft Exchange servers (version 2013 and earlier) are affected if they have the WebReady Document Viewing enabled. According to Microsoft documentation, this feature lets users view common file types like .doc, .pdf, .ppt and .xls directly in the Outlook Web App web browser. “An attacker could exploit these vulnerabilities by sending a malicious email attachment to a victim who then opens the email using web preview,” the Cisco Talos researchers said in a blog post. “Further, if Data Loss Prevention is enabled, the vulnerability can be triggered simply by sending an email with a malicious attachment outbound from the affected Exchange server.” If a Microsoft Exchange server also has the Avira AntiVir for Exchange installed, the vulnerabilities can be exploited by simply sending a specially crafted email without the victim even opening it. That’s because this antivirus program also uses the vulnerable OIT SDKs and scans all incoming and outgoing email automatically. File formats can be very complex and processing them without proper validation has historically been a source of remote code execution vulnerabilities in all sorts of applications. Understandably, many software developers rely on third-party SDKs and libraries for parsing file and data formats, instead of implementing such functionality themselves, a task that would be time consuming and prone to error. “However, the unfortunate reality is that vulnerabilities that are found in an SDK that is utilized by third-parties will take additional time to patch: First the organization that maintains the SDK issues a fix, and some amount of time later, third-parties that utilize the SDK provide an update to their customers including these fixes,” the Cisco researchers said. “This provides a rather large window of time in which miscreants can exploit vulnerabilities in third-party products.” At a time when over 80 percent of any new software application consists of third-party code, tracking vulnerabilities in outside libraries is very important. Unfortunately, studies show that many software developers not only fail at this task, but don’t even have a clear picture of which third-party components they used in which of their applications. Related content news Network jobs watch: Hiring, skills and certification trends What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. By Denise Dubie Jun 06, 2024 12 mins Careers Data Center Networking news Intel launches sixth-generation Xeon processor line With the new generation chips, Intel is putting an emphasis on energy efficiency. By Andy Patrizio Jun 06, 2024 3 mins CPUs and Processors Data Center news Cisco debuts CCDE-AI Infrastructure certification Cisco's new certification aims to help prepare IT pros to design, provision and optimize networks and systems needed for demanding AI/ML workloads. By Denise Dubie Jun 06, 2024 4 mins Certifications IT Jobs Careers feature Buyer’s guide: Secure Access Service Edge (SASE) and Secure Service Edge (SSE) SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide it varies widely. By Neal Weinberg Jun 06, 2024 22 mins SASE Access Control Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe