Oracle lists workarounds following zero-day disclosure

Share this article:

Oracle on Monday acknowledged a still-unpatched database vulnerability for which proof-of-concept code was published by a researcher who thought the hole had been plugged.

In its alert, Oracle advised users to apply workaround measures and configuration changes as noted.

The serious vulnerability, which earned a 7.5 CVSS score, is remotely exploitable without the need for authentication by the attacker and affects 10g and 11g (the most current) versions of Oracle Database.

Four years ago, researcher Joxean Koret reported the man-in-the-middle flaw to bug-bounty program iSight Partners, which in turn, shared the details with Oracle per its reward program specifications.

In its quarterly security update two weeks ago, Oracle finally fixed the bug. Or at least that's what Koret thought, considering he was given credit by Oracle in its "Security-In-Depth" program.

Koret said he casually followed up with Oracle to learn which vulnerability he was being credited for -- and then, thinking the coast was clear, published a proof-of-concept for the bug.

But he sent another email to Oracle after being confused by some language in the first exchange. As it turned out, the defect was only repaired in future versions of the database.

He said attackers can exploit the flaw to "sniff any connection" made to the database without the need for credentials, and can also inject malicious commands.

He added that he is not aware of any in-the-wild attacks underway.

In Monday's alert, Oracle said it tries to fix vulnerabilities first in "the main code line" and then "backported" through its quarterly security updates. But sometimes backporting is not possible due to heavy amounts of code required or because doing so will cause serious performance issues for customers.



Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Florida Supreme Court rules warrants a must for real-time cell location tracking

Florida Supreme Court rules warrants a must for ...

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger ...

The modular malware was named "Ventir," by researchers at Kaspersky.

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Fake Dropbox login page nabs credentials, is hosted ...

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.