Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Recent Oracle vulnerabilities: any xploit in the wild?
From: "K. K. Mookhey" <cto () nii co in>
Date: Fri, 10 Sep 2004 12:58:18 +0530

Exploiting these is pretty trivial. Some are Buffer Overflows, which if
the attacker is logged in (SCOTT/TIGER, DBSNMP/DBSNMP), are simple to
execute and create a DoS situation or worse.

For the SQL injection one's you can check out David Litchfield's
presentation at Blackhat this year (www.blackhat.com), or read Pete
Finnigan's articles on exploiting SQL injection in Oracle
(www.petefinnigan.com). Won't be too difficult to exploit.

So the answer to your question, when you say you are trying to assess
the risk, is that the risk is VERY HIGH. Therefore, patch as soon as
possible. If patching is not immediately possible, follow all Oracle
security guidelines. Refer:
1. www.cisecurity.org Oracle Security Guide
2. Oracle 9i Security Checklist (technet.oracle.com)
3. Auditing Oracle Security,


K. K. Mookhey
Founder & CTO
Network Intelligence (I) Pvt. Ltd.
Web: www.nii.co.in
Tel: +91-22-22001530/22006019
Information Assurance Services

M. D. wrote:

>> Dear colleagues,
>> We are trying to assess the risk for our business regarding the new Oracle vulnerabilities.
>> On one side we see the reported 44 detailed Oracle vulnerabilities (August 31st 2004)
>> from 'Application Security, Inc.'
>> http://www.appsecinc.com/resources/alerts/oracle/2004-0001/
>> and on the other side we have multiple vulnerabilities reported by NGSSoftware
>> http://www.nextgenss.com/advisories/oracle-01.txt,
>> which do not publish details about their vulnerabilities yet.
>> So it looks that we talk of about 70-80 actual vulnerabilities...
>> Are you aware of any xploits being already created for any of these?
>> Thank you in advance.
>> Kind regards,
>> Nekromancer

Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]