-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 TeamSHATTER Security Advisory Oracle 11g Stealth Password Cracking Vulnerability February 20, 2013 Risk Level: High Affected versions: Oracle Database Server version 11gR1, 11gR2 Remote exploitable: Yes (No authentication to Database Server is needed) Credits: This vulnerability was discovered and researched by Esteban Martinez Fayo of Application Security Inc. Details: There is a flaw in the way that Authentication Session Keys are generated and protected by Oracle Database Server during the authentication process. It is possible to use this flaw to perform unlimited password guesses (cracking) of any user password in a similar way as if the password hash would be available. All users that are authenticated by the database using logon protocol version 11 are affected by this vulnerability. This includes all users created with the "IDENTIFIED BY" clause, including the SYS user. The attack can be performed remotely without the need of a valid username and password. The attacker just needs to know the SID of the database and the name of a valid user. The attack can be done with just a few network packets and without leaving any trace in native auditing facilities. Impact: Remote unauthenticated attackers can perform offline bruteforce on users passwords, testing millions of passwords per second. Vendor Status: Vendor was contacted and a patch was released. Workaround: Some possible workarounds: 1) Use strong user passwords. A strong password will make password guessing more difficult (or impossible) to solve in reasonable time. 2) Use external authentication. Only users that are authenticated by the database are affected by this vulnerability. Users that are authentication by external means are not affected; this includes users authenticated by the Operating System and the Network (SSL or third-parties like Kerberos). 3) Disable protocol version 11 and use version 10 or lower instead. To do this, set initialization parameter SEC_CASE_SENSITIVE_LOGON to FALSE. See https://www.teamshatter.com/?p=3951 for more information about the workarounds. Fix: Apply Oracle Critical Patch Update October 2012 available at Oracle Support. CVE: CVE-2012-3137 Links: http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html https://www.teamshatter.com/?p=4120 https://www.teamshatter.com/?p=3951 Timeline: Vendor Notification - 4/21/2010 Vendor Response - 4/26/2010 Fix - 10/16/2012 Public Disclosure - 2/20/2013 - -- _____________________________________________ Copyright (c) 2013 Application Security, Inc. http://www.appsecinc.com About Application Security, Inc. AppSecInc is a pioneer and leading provider of database security solutions for the enterprise. By providing strategic and scalable software-only solutions - AppDetectivePro for auditors and IT advisors, and DbProtect for the enterprise - AppSecInc supports the database security lifecycle for some of the most complex and demanding environments in the world across more than 1,300 active commercial and government customers. Leveraging the world's most comprehensive database security knowledgebase from the company's renowned team of threat researchers, TeamSHATTER, AppSecInc products help customers achieve unprecedented levels of data security from nefarious or accidental activities, while reducing overall risk and helping to ensure continuous regulatory and industry compliance. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) iEYEARECAAYFAlEmKt8ACgkQRx91imnNIgHM8wCeI7rz04b9jdt/uriRs+Su2m4R SDUAoJoTdwrJYSfl6aN9Hb+ieGs7dHk9 =yOaN -----END PGP SIGNATURE-----