[TOOL] THC-Orakel - Cracking Oracle Passwords Within Seconds



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



THC-Orakel - Cracking Oracle Passwords Within Seconds
------------------------------------------------------------------------


SUMMARY



DETAILS

THC presents a crypto <http://www.thc.org/thc-orakel> paper analyzing the
database authentication mechanism used by oracle. THC further releases
practical tools to sniff and crack the password of an oracle database
within seconds.

One of the network authentication modes used by Oracle databases uses a
weak key exchange mechanism. This mechanism is still used on the newest
database versions using Oracle's JAVA drivers. Also, for native Oracle
drivers an attack is known to downgrade the authentication mode to the
vulnerable version. The orakelsniffert article documents the mechanism
used by the weak authentication mode, the complexity and impact of the
attack and an example of an attack in the field. A Windows based cracker
and a simple JAVA based client application are included to verify the
results. Also, a supporting crypto utility is released.


ADDITIONAL INFORMATION

The information has been provided by <mailto:rm@xxxxxxxxxx> vonjeek.
To keep updated with the tool visit the project's homepage at:
<http://www.thc.org/thc-orakel> http://www.thc.org/thc-orakel



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Oracle Database Local Untrusted Library Path Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Oracle Database Local Untrusted Library Path Vulnerability ...
    (Securiteam)
  • [NEWS] Multiple Vulnerabilities in Oracle Database (Character Conversion, Extproc, Password Disclosu
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities were discovered in the (Oracle database server ... password is required to exploit this vulnerability. ...
    (Securiteam)
  • [NEWS] Oracle Database Buffer Overflows and DoS Vulnerabilities in Public Procedures Of MDSYS.MD
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Oracle Database Buffer Overflows and DoS Vulnerabilities in Public ... vulnerability allows an attacker to execute arbitrary code. ...
    (Securiteam)
  • [EXPL] Oracle Command Line Overflow (Exploit)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A locally exploitable buffer overflow has been found in the 'oracle' ... restricted sections of the database, ... 'print "A"x9850'` Segmentation fault ...
    (Securiteam)
  • [NEWS] Oracle Forms SQL Injection
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... part of the Oracle Developer Suite 10g". ... All Oracle Forms applications are by default vulnerable to SQL Injection. ... The following statement sends the result of the SQL statement: ...
    (Securiteam)