Attack Easily Cracks Oracle Database Passwords

  /     /     /  
Publicated : 22/11/2024   Category : security


Attack Easily Cracks Oracle Database Passwords


Oracles software update for the flaw doesnt protect all versions of the database



A researcher tomorrow will demonstrate a proof-of-concept attack that lets outside attackers and malicious insiders surreptitiously crack passwords for Oracle databases with a basic brute-force attack.
Esteban Martinez Fayo, a researcher with AppSec Inc., will show at the
Ekoparty security conference
in Buenas Aires, Argentina, an attack exploiting cryptographic flaws he discovered in Oracles database authentication protocol. It lets an attacker without any database credentials brute-force hack the password hash of any database user so he then can get to the data.
Martinez Fayo and his team first reported the bugs to Oracle in May 2010. Oracle fixed it in mid-2011 via the 11.2.0.3 patch set, issuing a new version of the protocol. But they never fixed the current version, so the current 11.1 and 11.2 versions are still vulnerable, Martinez Fayo says, and Oracle has no plans to fix the flaws for version 11.1.
That leaves those database users at risk of what Martinez Fayo says is a fairly simple -- yet potentially devastating -- attack against the so-called stealth password cracking vulnerability. Its pretty simple. The attacker just needs to know a valid username in the database, and the database name. Thats it, he says.
Then its just a matter of brute-forcing the hashes, taking advantage of the Oracle authentication protocols inadvertent leakage of information in the initial handshake. Theres no man-in-the-middle required: The attacker just needs to initiate standard authentication with the server. The server will answer ... from the password salt of the user. Thats all the attacker needs, he says.
Martinez Fayo says this is part of the authentication protocols operation, but prior to the actual authentication itself. They can do a brute-force attack from there, he says. This is a critical issue because its very easy to exploit, and it doesnt require any privileges ... anyone with a network connection to the database [can do it].
It destroys a very critical protocol ... it seems the developers didnt pay much attention to cryptographics 101, Martinez Fayo says. Its very basic.
Oracles fix for the flaw is basically a new but incompatible version of the protocol that leaves the current version still open to attack. Oracle has been very quiet about [the flaw], says Alex Rothacker, director of security research for AppSecs TeamSHATTER. The only comment from them was a paragraph about a new protocol fixing some security issues. They havent said anything that made people aware to update the database and all of the database clients.
The 11.2.0.3 patchset wasnt part of Oracles Critical Patch Update (CPU) cycle, and includes change for both the client and server side.
[ Database indexes the new low-hanging fruit for database vulnerabilities. See
Hacking Oracle Database Indexes
. ]
Oracle clients with versions prior to 11.2.0.3 wont be able to connect to databases supporting the new version, the researchers say.
There are workarounds: Disable the protocol in Version 11.1 and start using older versions like Version 10g, which [contains an older protocol that] is not vulnerable, AppSecs Martinez Fayo says.
Other options: employing external authentication via SSL or directory services, for example; resetting the SEC_CASE_SENSITIVE_LOGON initialization parameter to FALSE; and removing 11g hashes so the database will default to 10g hashes.
It is vital for organizations that deploy Oracle databases affected by these vulnerabilities to administer strong workarounds to prevent an attack, Martinez Fayo says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Attack Easily Cracks Oracle Database Passwords