Oracle patched the vulnerabilities in its “Oracle Outside In” code libraries as part of a massive update on July 17 that fixed nearly 90 flaws in its database software.
Exchange, as well as Microsoft’s FAST Search Server 2010 for SharePoint, use the Oracle Outside In libraries to display file attachments in a browser rather than to open them in a locally-stored application, like Microsoft Word. The vulnerabilities are within the code that parses those attachments.
“An attacker who successfully exploited these vulnerabilities could run arbitrary code under the process that is performing the parsing of the specially crafted files,” said Microsoft in the security advisory it issued a week ago.
A successful exploit of an Exchange server would let hackers “install programs; view, change, or delete data; or take any other action that the server process has access to do.”
Microsoft downplayed the threat, saying elsewhere that it was unaware of any active, in-the-wild exploits.
In the absence of an immediate patch — Microsoft said it is working on an update, but gave no release timetable — the company’s Security Research & Defense blog and the advisory recommended that IT administrators temporarily disable those Exchange Server and FAST Search Server features that relied on the Oracle Outside In libraries.