Re: Recent Oracle vulnerabilities: any xploit in the wild?

From: K. K. Mookhey (cto@nii.co.in)
Date: Fri Sep 10 2004 - 03:28:18 EDT


Exploiting these is pretty trivial. Some are Buffer Overflows, which if
the attacker is logged in (SCOTT/TIGER, DBSNMP/DBSNMP), are simple to
execute and create a DoS situation or worse.

For the SQL injection one's you can check out David Litchfield's
presentation at Blackhat this year (www.blackhat.com), or read Pete
Finnigan's articles on exploiting SQL injection in Oracle
(www.petefinnigan.com). Won't be too difficult to exploit.

So the answer to your question, when you say you are trying to assess
the risk, is that the risk is VERY HIGH. Therefore, patch as soon as
possible. If patching is not immediately possible, follow all Oracle
security guidelines. Refer:
1. www.cisecurity.org Oracle Security Guide
2. Oracle 9i Security Checklist (technet.oracle.com)
3. Auditing Oracle Security,
http://www.theiia.org/itaudit/index.cfm?fuseaction=print&fid=5509

Cheers,

-- 
K. K. Mookhey
Founder & CTO
Network Intelligence (I) Pvt. Ltd.
Web: www.nii.co.in
Tel: +91-22-22001530/22006019
------------------------------------
Information Assurance Services
http://www.nii.co.in/services.html
------------------------------------
M. D. wrote:
 >> Dear colleagues,
 >>
 >> We are trying to assess the risk for our business regarding the new 
Oracle vulnerabilities.
 >>
 >> On one side we see the reported 44 detailed Oracle vulnerabilities 
(August 31st 2004)
 >> from 'Application Security, Inc.'
 >>
 >> http://www.appsecinc.com/resources/alerts/oracle/2004-0001/
 >>
 >>
 >> and on the other side we have multiple vulnerabilities reported by 
NGSSoftware
 >>
 >> http://www.nextgenss.com/advisories/oracle-01.txt,
 >>
 >> which do not publish details about their vulnerabilities yet.
 >>
 >> So it looks that we talk of about 70-80 actual vulnerabilities...
 >>
 >> Are you aware of any xploits being already created for any of these?
 >>
 >> Thank you in advance.
 >> Kind regards,
 >>
 >> Nekromancer
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:05 EDT