Oracle databases easy to hack..!!!
- A security researcher claims the company's databases are vulnerable to brute-force attacks because of an authentication flaw.
- A researcher showed today that Oracle's databases could be hacked
with brute-force attacks using only the database's name and a username,
according to Kaspersky Lab Security News.
-
Esteban Martinez Fayo, who works for AppSec Inc., was demonstrating his
discovery at a security conference in Argentina and said that within
just five hours on a regular PC using a special tool he could hack
through easy passwords and access users' data.
- "It's pretty simple," Martinez Fayo told the security blog Dark Reading. "The attacker just needs to know a valid username in the database, and the database name. That's it."
- Martinez
Fayo says he discovered cryptographic flaws in Oracle's password
authentication that allows for an easy brute-force hack. According to
Martinez Fayo, the crack doesn't require a "man-in-the-middle" to spoof
multiple users -- the server leaks vital information directly to the
attacker.
- Martinez Fayo said that his team first told Oracle about the bugs
in May 2010 and the company fixed them in 2011. However, he said, they
didn't fix the current version, which leaves 11.1 and 11.2 still
susceptible to attacks. The company's newly released version 12 does fix
the problem.
- This isn't the first time that security flaws have been found on Oracle databases. In January, the company squashed 78 software bugs
in a major patch that stemmed from a flaw that allowed hackers into its
databases remotely. And, just last month, new vulnerabilities that can
be exploited to run arbitrary code were discovered in Oracle's latest Java 7 update.
-
Martinez Fayo said there are workarounds for the flaw. "Disable the
protocol in Version 11.1 and start using older versions like Version
10g," which is not vulnerable, he said. "It is vital for organizations
that deploy Oracle databases affected by these vulnerabilities to
administer strong workarounds to prevent an attack."
No comments:
Post a Comment