Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Oracle Authentication Vulnerability Enables Trivial Password Cracking

A security researcher from Application Security, Inc. (AppSec) has discovered a flaw in Oracle’s software that would allow an attacker to crack database passwords with basic brute-force attacks. Details of the attack were discussed on Thursday at the Ekoparty conference in Argentina.

A security researcher from Application Security, Inc. (AppSec) has discovered a flaw in Oracle’s software that would allow an attacker to crack database passwords with basic brute-force attacks. Details of the attack were discussed on Thursday at the Ekoparty conference in Argentina.

Esteban Martinez Fayó, the researcher who discovered the issues, reported the problems with the authentication protocol to Oracle last year. However, when a new version of the protocol was released by the database giant, version 12, the older versions were left untouched. Thus, customers running version 11.1 or older – even after applying the patch released by Oracle – remain vulnerable.

Oracle Authentication Vulnerability“The Oracle stealth password cracking vulnerability is a critical one. There are many components to affirm this: It is easy to exploit, it doesn’t leave any trace in the database server and it resides in an essential component of the logon protocol,” Martinez Fayó said in an interview with ThreatPost.

“It is very simple to exploit. The attacker just needs to send a few network packets or use a standard Oracle client to get a Session Key and Salt for a particular user. Then, an attack similar to that of cracking SHA-1 password hash can be performed. I developed a proof-of-concept tool that shows that it is possible to crack an 8 characters long lower case alphabetic password in approximately 5 hours using standard CPUs.”

Administrators can protect themselves, he added, by requiring external authentication, or disabling version 11 of the authentication protocol on the server’s config files. It’s important to note, that while mitigations are easily available, if they are not taken, then the issue remains a serious risk to an organizations data.

Anyone with a network connection can pull off this attack, and there is no need for privileges on the network. Additional information will be made available from AppSec in October.

Related: Oracle Steps Up – Delivers Emergency Java Patch to Fix Recent Security Flaws

Related: Many Concerned Over Oracle’s Response to Security Vulnerabilities

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...