From: K. K. Mookhey (cto@nii.co.in)
Date: Fri Sep 10 2004 - 03:28:18 EDT
Exploiting these is pretty trivial. Some are Buffer Overflows, which if
the attacker is logged in (SCOTT/TIGER, DBSNMP/DBSNMP), are simple to
execute and create a DoS situation or worse.
For the SQL injection one's you can check out David Litchfield's
presentation at Blackhat this year (www.blackhat.com), or read Pete
Finnigan's articles on exploiting SQL injection in Oracle
(www.petefinnigan.com). Won't be too difficult to exploit.
So the answer to your question, when you say you are trying to assess
the risk, is that the risk is VERY HIGH. Therefore, patch as soon as
possible. If patching is not immediately possible, follow all Oracle
security guidelines. Refer:
1. www.cisecurity.org Oracle Security Guide
2. Oracle 9i Security Checklist (technet.oracle.com)
3. Auditing Oracle Security,
http://www.theiia.org/itaudit/index.cfm?fuseaction=print&fid=5509
Cheers,
-- K. K. Mookhey Founder & CTO Network Intelligence (I) Pvt. Ltd. Web: www.nii.co.in Tel: +91-22-22001530/22006019 ------------------------------------ Information Assurance Services http://www.nii.co.in/services.html ------------------------------------ M. D. wrote: >> Dear colleagues, >> >> We are trying to assess the risk for our business regarding the new Oracle vulnerabilities. >> >> On one side we see the reported 44 detailed Oracle vulnerabilities (August 31st 2004) >> from 'Application Security, Inc.' >> >> http://www.appsecinc.com/resources/alerts/oracle/2004-0001/ >> >> >> and on the other side we have multiple vulnerabilities reported by NGSSoftware >> >> http://www.nextgenss.com/advisories/oracle-01.txt, >> >> which do not publish details about their vulnerabilities yet. >> >> So it looks that we talk of about 70-80 actual vulnerabilities... >> >> Are you aware of any xploits being already created for any of these? >> >> Thank you in advance. >> Kind regards, >> >> Nekromancer ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:05 EDT