Oracle Fixes Security Flaw In Flagship Database

Oracle has fixed a security vulnerability in its flagship relational database product that was revealed at the Black Hat security conference in July in Las Vegas.

At the conference, Oracle database security guru David Litchfield of Accuvant Labs outlined CVE-2012-3132, a vulnerability in the Oracle database server.

Oracle Flaw

The issue was one of multiple attacks that Litchfield demonstrated against the Oracle indexing architecture. The flaw allows authenticated remote users to execute arbitrary SQL commands via vectors involving CREATE INDEX with a CTXSYS.CONTEXT INDEXTYPE and DBMS_STATS.GATHER_TABLE_STATS.

While it is not exploitable by remote unauthenticated users, an attacker could exploit the issue as part of a privilege escalation attack and gain ‘SYS’ privileges.

“Patches and relevant information for protecting against this vulnerability can be found in My Oracle Support Note 1480492.1,” Oracle explained in a security advisory. “Mitigations for this issue for Oracle Database Server versions 9i through 11gR2 can be found in My Oracle Support Note 1482694.1. Due to the threat posed by a successful attack and the public disclosure of the technical details of this vulnerability, Oracle strongly recommends that customers apply this Security Alert solution as soon as possible.”

The issue impacts versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2 and 11.2.0.3 of the Oracle database server. According to the company, versions 11.2.0.2 and 11.2.0.3 do not require patching if the July 2012 Critical Patch Update has been applied.

“Since Oracle Fusion Middleware, Oracle Enterprise Manager, Oracle E-Business Suite include the Oracle Database Server component that is affected by this vulnerability, Oracle recommends that customers apply this fix as soon as possible to the Oracle Database Server component,” according to Oracle.

Bug Workaround

For older systems such as Oracle 8i, the company released a workaround with instructions on how to create a database trigger that prevents the creation of a database object required to exploit this vulnerability, explained Alex Rothacker, director of security research for Application Security’s TeamSHATTER.

“Since this vulnerability allows a full takeover of the database, SHATTER would give this vulnerability a CVSSv2 score of 9. This is a very high-risk vulnerability, with publicly available exploit code,” he said. “Organisations should apply the patches released by Oracle ASAP, and if they are running a version of Oracle for which a patch is not available, they should immediately implement the workaround released by Oracle. A good database activity monitoring solution with the proper attack signatures can also help in identifying and preventing an attack using this vulnerability.”

How well do you know Internet security? Try our quiz and find out!

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

New Intel Chief Lip-Bu Tan ‘Considers’ Job Cuts, Factory Revamp

Incoming Intel chief executive Lip-Bu Tan considering cuts to middle management, revamp of Intel Foundry,…

9 mins ago

South Korea Sees China Chip Exports Slump

South Korean chip exports to China fall by nearly one-third after US government restricts sales…

39 mins ago

New Huawei Chip Appears As Company Shifts Away From Windows, Intel

Huawei's Kirin X90 chip receives security certification ahead of rumoured launch of HarmonyOS-based PC next…

1 hour ago

Telegram’s Durov Allowed To Leave France As Probe Continues

Telegram founder Durov permitted to temporarily leave France as authorities continue probe into criminal activity…

2 hours ago

Tech Firms Now Face Fines Under Online Safety Act

Ofcom now has power to issue fines and other penalties for failure to remove illegal…

12 hours ago

OpenAI Argues Case For AI-Friendly US Rules

OpenAI document proposes exemption from state regulations, access to copyrighted materials, promotion of US AI…

23 hours ago