Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:49 PM
Connect Directly

Attack Easily Cracks Oracle Database Passwords

Oracle's software update for the flaw doesn't protect all versions of the database

A researcher tomorrow will demonstrate a proof-of-concept attack that lets outside attackers and malicious insiders surreptitiously crack passwords for Oracle databases with a basic brute-force attack.

Esteban Martinez Fayo, a researcher with AppSec Inc., will show at the Ekoparty security conference in Buenas Aires, Argentina, an attack exploiting cryptographic flaws he discovered in Oracle's database authentication protocol. It lets an attacker without any database credentials brute-force hack the password hash of any database user so he then can get to the data.

Martinez Fayo and his team first reported the bugs to Oracle in May 2010. Oracle fixed it in mid-2011 via the patch set, issuing a new version of the protocol. "But they never fixed the current version, so the current 11.1 and 11.2 versions are still vulnerable," Martinez Fayo says, and Oracle has no plans to fix the flaws for version 11.1.

That leaves those database users at risk of what Martinez Fayo says is a fairly simple -- yet potentially devastating -- attack against the so-called stealth password cracking vulnerability. "It's pretty simple. The attacker just needs to know a valid username in the database, and the database name. That's it," he says.

Then it's just a matter of brute-forcing the hashes, taking advantage of the Oracle authentication protocol's inadvertent leakage of information in the initial handshake. There's no man-in-the-middle required: "The attacker just needs to initiate standard authentication with the server. The server will answer ... from the password salt of the user. That's all the attacker needs," he says.

Martinez Fayo says this is part of the authentication protocol's operation, but prior to the actual authentication itself. "They can do a brute-force attack from there," he says. "This is a critical issue because it's very easy to exploit, and it doesn't require any privileges ... anyone with a network connection to the database [can do it]."

"It destroys a very critical protocol ... it seems the developers didn't pay much attention to cryptographics 101," Martinez Fayo says. "It's very basic."

Oracle's fix for the flaw is basically a new but incompatible version of the protocol that leaves the current version still open to attack. "Oracle has been very quiet about [the flaw]," says Alex Rothacker, director of security research for AppSec's TeamSHATTER. "The only comment from them was a paragraph about a new protocol fixing some security issues. They haven't said anything that made people aware to update the database and all of the database clients."

The patchset wasn't part of Oracle's Critical Patch Update (CPU) cycle, and includes change for both the client and server side.

[ Database indexes the new "low-hanging" fruit for database vulnerabilities. See Hacking Oracle Database Indexes. ]

Oracle clients with versions prior to won't be able to connect to databases supporting the new version, the researchers say.

There are workarounds: "Disable the protocol in Version 11.1 and start using older versions like Version 10g, which [contains an older protocol that] is not vulnerable," AppSec's Martinez Fayo says.

Other options: employing external authentication via SSL or directory services, for example; resetting the SEC_CASE_SENSITIVE_LOGON initialization parameter to FALSE; and removing 11g hashes so the database will default to 10g hashes.

"It is vital for organizations that deploy Oracle databases affected by these vulnerabilities to administer strong workarounds to prevent an attack," Martinez Fayo says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...