mailing list archives
Re: DoS against Oracle Webserver 2.1 with PL/SQL stored procedures
From: matth () mcr com (Matthew G. Harrigan)
Date: Wed, 23 Jul 1997 14:14:50 -0700
At 07:22 AM 7/23/97 -0400, you wrote:
you can pull most text files from the Operating System). I say this because as
an administrator, I found that all our users chose to have a database password
the same as a machine password. Guess what? Oracle has it's passwords in plain
Also, the sqlnet client program accepts command-line parameters for username,
and password. If I recall correctly, its something like:
sqlnet user/password () INSTANCE_NAME
so, in order to gain unauthorized access to the database, all one has to do
is grep through the machines proc list.
On another note, Im not sure which version of oracle this is applicable to (I believe
it is 7X), and I dont recall seeing this bug posted before, but the database authentication mechanism appears to do a
regular expression on the account name for /^sys/ before authenticating it, and upon a match, assigning system level
access to that account.
I.E. - If your account name is sysdood or sysenor, oracle assumes you are infact
system, and logs you in as such.
Once again, I have not thoroughly tested this, and remember it in passing from
penetration tests sometime back, so it should be tested & verified long before it
is fretted about.
Matthew G. Harrigan
</bold>CIO, Microcosm Computer Resources
matth () mcr com