10 Oracle Bugs in 10 Minutes

Black Hat researcher demos how to easily find database bugs with freely available tools

Dark Reading logo in a gray background | Dark Reading

ARLINGTON, Va. -- Black Hat DC -- The researcher who scrapped plans for a week of Oracle bugs late last year found nearly a bug a minute in the database software during an audit demonstration of the database software here today.

Cesar Cerrudo, CEO of Argeniss, demonstrated a simple 10-minute audit that developers and security managers can use with free tools such as Process Explorer, WinObj, Pipeacl, and Interactive Disassembler (IDA) to determine the security of Windows applications. He found the process-permissions bugs in Oracle version 10g R2 running over Windows. Weak permissions parameters can let an attacker manipulate objects in an app.

The bugs were very easy to find, he says. "The new version of Oracle is more secure than previous versions, but that doesn't mean it is secure," Cerrudo says. Oracle still has a lot of work to do, he says.

"In this case, I showed it on Oracle. But any [database] software could be affected." Most of the bugs Cerrudo found would allow an attacker to launch a denial-of-service attack, and some, to execute code remotely.

Security experts agree such a simple hack with free and easily accessible tools is a bit unnerving.

"These kinds of permissions problems are rampant on Windows-based applications. It's probably not just Oracle," says Steve Christey, principal information security engineer for Mitre. "And not many people [researchers] are looking at this issue" at this time.

Cerrudo demonstrated proof-of-concept exploit code he had developed and emphasized how simple the techniques for finding these bugs are. "You don't need any [special] skills" to use these tools and find bugs, he says. "You just follow some basic instructions."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Read more about:

2007

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights