Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Oracle :: ora5990.htm

Oracle unauthenticated remote system compromise



17th Feb 2003 [SBWID-5990]
COMMAND

	Oracle unauthenticated remote system compromise

SYSTEMS AFFECTED

	All platforms; Oracle9i Database Release 2, 9i  Release  1,  8i,  8.1.7,
	8.0.6

PROBLEM

	Thanks to Mark Litchfield [mark@ngssoftware.com] of NGSSoftware  Insight
	Security Research, advisory [#NISR16022003a] :
	
	Oracle is the leader in the database market  with  a  54%  market  share
	lead under ERP (Enterprise Resource Planning). The  database  server  is
	vulnerable to a  remotely  exploitable  buffer  overflow  vulnerability.
	What exacerbates this problem is that no valid User ID  or  password  is
	required by an attacker.
	
	 Details
	 *******
	
	There is a remotely exploitable buffer  overflow  vulnerability  in  the
	authentication process with the Oracle Database Server. By supplying  an
	overly long username when attempting to log onto the database server  an
	attacker can overflow a stack based buffer overwriting the saved  return
	address. Any arbitrary code supplied by an attacker would  execute  with
	the same privileges as the user running the  service;  this  account  is
	typically "Oracle" on linux/unix based platforms  and  Local  System  on
	Windows based operating systems such as NT/2000/XP. As such this  allows
	for a complete compromise  of  the  data  stored  in  the  database  and
	possibly a complete compromise of the operating system. As  most  client
	applications for Oracle will tuncate the length  of  the  username  that
	can be supplied to the database an attacker would need  to  write  their
	own  Oracle  "Authenticator"  to  exploit   this   issue.   That   said,
	NGSSoftware has found one client  application  that  will  allow  longer
	usernames so to test if you  are  vulnerable  to  this  issue,  use  the
	LOADPSP utility  usually  found  in  "bin"  directory  found  under  the
	OracleHomeInstallDirectory. On Windows, for example, run:
	
	 C:\ora9ias\BIN>loadpsp -name -user LONGUSERNAME/tiger@iasdb myfile
	

SOLUTION

	 Fix Information
	 ***************
	
	NGSSoftware alerted Oracle  to  this  vulnerability  on  30th  September
	2002. Oracle has  reviewed  the  code  and  created  a  patch  which  is
	available from:
	 
	http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf
	
	NGSSoftware advise Oracle database customers to review and  install  the
	patch as a matter of urgency.
	
	A check for these issues has been added to  NGSSQuirreL  for  Oracle,  a
	comprehensive  automated  vulnerability  assessment  tool   for   Oracle
	Database Servers  of  which  more  information  is  available  from  the
	NGSSite
	 
	http://www.ngssoftware.com/software/squirrelfororacle.html
	
	It is further recommend that Oracle  DBAs  have  their  network/firewall
	administrators  ensure  that  the  database  server  is  protected  from
	Internet sourced traffic.
	
	
	 Further Information
	 *******************
	
	For further information about the scope and effects of buffer overflows,
	please see
	
	http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
	http://www.ngssoftware.com/papers/ntbufferoverflow.html
	http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
	http://www.ngssoftware.com/papers/unicodebo.pdf
	
	 About NGSSoftware
	 *****************
	
	NGSSoftware design, research and develop intelligent, advanced application
	security assessment scanners. Based in the United Kingdom, NGSSoftware have
	offices in the South of London and the East Coast of Scotland. NGSSoftware's
	sister company NGSConsulting, offers best of breed security consulting
	services, specialising in application, host and network security
	assessments.
	
	http://www.ngssoftware.com/
	http://www.ngsconsulting.com/
	
	Telephone +44 208 401 0070
	Fax +44 208 401 0076
	
	enquiries@ngssoftware.com
	


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH