Oracle has fixed a security vulnerability in its flagship relational database product that was revealed at the Black Hat security conference in July in Las Vegas.
At the conference, Oracle database security guru David Litchfield of Accuvant Labs outlined CVE-2012-3132, a vulnerability in the Oracle database server.
The issue was one of multiple attacks that Litchfield demonstrated against the Oracle indexing architecture. The flaw allows authenticated remote users to execute arbitrary SQL commands via vectors involving CREATE INDEX with a CTXSYS.CONTEXT INDEXTYPE and DBMS_STATS.GATHER_TABLE_STATS.
While it is not exploitable by remote unauthenticated users, an attacker could exploit the issue as part of a privilege escalation attack and gain ‘SYS’ privileges.
The issue impacts versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2 and 11.2.0.3 of the Oracle database server. According to the company, versions 11.2.0.2 and 11.2.0.3 do not require patching if the July 2012 Critical Patch Update has been applied.
“Since Oracle Fusion Middleware, Oracle Enterprise Manager, Oracle E-Business Suite include the Oracle Database Server component that is affected by this vulnerability, Oracle recommends that customers apply this fix as soon as possible to the Oracle Database Server component,” according to Oracle.
For older systems such as Oracle 8i, the company released a workaround with instructions on how to create a database trigger that prevents the creation of a database object required to exploit this vulnerability, explained Alex Rothacker, director of security research for Application Security’s TeamSHATTER.
“Since this vulnerability allows a full takeover of the database, SHATTER would give this vulnerability a CVSSv2 score of 9. This is a very high-risk vulnerability, with publicly available exploit code,” he said. “Organisations should apply the patches released by Oracle ASAP, and if they are running a version of Oracle for which a patch is not available, they should immediately implement the workaround released by Oracle. A good database activity monitoring solution with the proper attack signatures can also help in identifying and preventing an attack using this vulnerability.”
How well do you know Internet security? Try our quiz and find out!
Incoming Intel chief executive Lip-Bu Tan considering cuts to middle management, revamp of Intel Foundry,…
South Korean chip exports to China fall by nearly one-third after US government restricts sales…
Telegram founder Durov permitted to temporarily leave France as authorities continue probe into criminal activity…
Ofcom now has power to issue fines and other penalties for failure to remove illegal…
OpenAI document proposes exemption from state regulations, access to copyrighted materials, promotion of US AI…