If you’re an Oracle administrator, hopefully you saw the text version of WatchGuard Security Week in Review a few weeks ago, where I mentioned Oracle’s big quarterly patch day for July 2012. If you missed that, you better check out their July CPU update, and apply all its patches. However, even if you managed to apply Oracle’s July patches, they have one more update in store for Database Server administrators.
At Blackhat this year, David Litchfield disclosed a bunch of new, unpatched security flaws in Oracle’s flagship Database Server. Litchfield is a renowned database security researcher, whose proof-of-concept exploit code was used to create the SQL Slammer worm years ago. Around a decade ago, Oracle launched an “unbreakable” marketing campaign, touting the security of their database products. In response, Litchfield spend the next few years at Blackhat pretty much decimating this “unbreakable” claim.
This year, Litchfield returned to form and disclosed more vulnerabilities in Oracle’s Database Server software. None of them are quite as severe as some of the buffer overflow flaws he’s demonstrated in the past; in fact Oracle had already patched many of them. However, Litchfield did demonstrate one new privilege elevation vulnerability, which allows any database user to gain SYS privileges (essentially complete control of your database).
The good news is, only a valid, authenticated user can exploit this flaw. This means an attacker needs to already have valid credentials on your Database Server to exploit it. Nonetheless, if you manage an Oracle Database Server, you should check out Oracle’s out-of-cycle alert, and apply the patch it recommends. – Corey Nachreiner, CISSP (@SecAdept).