lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Apr 2006 21:17:29 +0200
From: "Kornbrust, Alexander" <ak@...-database-security.com>
To: "Cesar" <cesarc56@...oo.com>,
	"David Litchfield" <davidl@...software.com>,
	"Steven M. Christey" <coley@...re.org>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Recent Oracle exploit is _actually_ an 0day with no patch


Cesar, David and Steve,

I agree with your opinion. Oracle is not really fast fixing security
issues. 

Currently I have 40+ OPEN/UNFIXED security issues in Oracle products. A
detailed list from Oracle secalert (Report March 2006) can be found at
the end of this email or (the latest version) on my webpage:

http://www.red-database-security.com/advisory/upcoming_alerts.html


Let's do some math. According to Mary Ann Davidson 75 % of all security
bugs are found by Oracle employees: If bugs are fixed independently by
the reporter then

   25  %  =  40 unfixed bugs       ( found by Red-Database-Security)
   75 %  =  120 unfixed bugs       ( found by Oracle employees)

 ==> 160 security bugs are still unfixed.

If Cesar, Esteban and David have a similar number of open security bugs,


   25 % = 100 unfixed bugs         ( ESTIMATED: reported by Argeniss,
NGS and RDS)
   75 % = 300 unfixed bugs         ( reported by Oracle employees) 

==> 400 (!!!) security bugs in Oracle are still unfixed. 


    UNBREAKABLE...


Regards

 Alexander

--
Red-Database-Security GmbH
http://www.red-database-security.com

#############
-----Original Message-----
From: Oracle Security Alerts [mailto:secalert_us@...cle.com] 
Sent: Tuesday, March 14, 2006 7:29 PM
To: Kornbrust, Alexander
Subject: Status of Red Database Security open vulnerability reports


The following is a list of all open issues that you have reported to us,
and
their current status.

____________________________________________________
Reporter:	Alexander Kornbrust (ak@...-database-security.com)
Organization:	Red Database Security
____________________________________________________
	
Tracking #:	2005-S050E
Description:	plaintext password exposure using xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	2005-S066E
Description:	xxx plaintext password in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	2005-S067E
Description:	xxx plaintext password in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	5448895
Description:	xxx ARE RUN AS SYS WHEN USING xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	5883663
Description:	XSS in Oracle xxx using xxx and xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	5883665
Description:	XSS in Oracle xxx using xxx and xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6343787 (Duplicate -- Previously reported)
Description:	xxx CROSS SITE SCRIPTING VULNERABILITY USING xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6343935 (Duplicate -- Previously reported)
Description:	CROSS SITE SCRIPTING IN xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6454153
Description:	SQL INJECTION VULNERABILITY IN xxx  USING xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6454409
Description:	xxx CAN BE BYPASSED USING xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6543483
Description:	SECURITY GUIDE NEEDS TO DOCUMENT DANGERS OF xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6543923
Description:	xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6914665
Description:	xxx CAN CRASH (POSSIBLE BUFFER OVERFLOW) IF HANDCRAFTED
PACKET PRESENTED
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980695
Description:	SQL Injection in xxx 
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980701
Description:	SQL Injections in xxx 
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980711
Description:	SQL Injections in xxx 
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980717
Description:	SQL Injection in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980725
Description:	SQL Injections in xxx 
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980733
Description:	SQL Injections in xxx    and xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980737
Description:	SQL Injections in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980745
Description:	SQL Injection in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980751
Description:	SQL Injections in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980753
Description:	SQL Injections in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980761
Description:	SQL Injections in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980765
Description:	SQL Injection in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980771
Description:	SQL Injections in  xxx   and  xxx  
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980775
Description:	SQL Injection in xxx
Status:		Issue fixed in main codeline, scheduled for a future CPU
	
Tracking #:	6980781
Description:	SQL Injections in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980783
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980789
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980793
Description:	SQL Injections in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980797
Description:	SQL Injections in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980807
Description:	SQL Injections in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980813
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980817
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980819
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline
	
Tracking #:	6980825
Description:	SQL Injection in xxx
Status:		Under investigation / Being fixed in main codeline

#############
> -----Original Message-----
> From: Cesar [mailto:cesarc56@...oo.com]
> Sent: Friday, April 28, 2006 6:33 PM
> To: David Litchfield; Steven M. Christey
> Cc: bugtraq@...urityfocus.com
> Subject: Re: Recent Oracle exploit is _actually_ an 0day with no patch
> 
> David is right, we also have reported hundreds of
> vulnerabiities to Oracle and they only fix what you
> report to them, they don't care to fix the same
> vulnerability on different portions of code, one good
> example is that Oracle should have eliminated SQL
> injection bugs since long time ago but there are still
> SQL injection bugs all around because they only fix
> bugs reported by researchers. I remember Mary Ann
> Davidson saying "Oracle finds more than 75 percent of
> significant security vulnerabilities in-house"
>
(http://news.com.com/When+security+researchers+become+the+problem/2010-
> 1071_3-5807074.html)
> so WTF you don't fix them!!!!!
> 
> I really can't understand how customers don't demand
> better security to Oracle or switch to other vendor, I
> would like to have customers like that so you can sell
> very unsecure products to them and them won't ever
> complain so I can save billons not improving security
> on products and make a lot of money$$$$.
> 
> PS: Look at this paper dated February 2002, amazing
> how Oracle efforts are visible on 2006!
> http://www.cgisecurity.com/database/oracle/pdf/unbreak3.pdf
> 
> 
> Cesar.
> 
> --- David Litchfield <davidl@...software.com> wrote:
> 
> > >
> > >>The recent Oracle exploit posted to Bugtraq
> > >>(http://www.securityfocus.com/archive/1/431353) is
> > actually an 0day
> > >>and has no patch.
> > >
> > > The referenced exploit seems to use
> > GET_DOMAIN_INDEX_METADATA with a
> > > TYPE_NAME that references an attacker-defined
> > package with a
> > > (modified?) ODCIIndexGetMeta function.
> > >
> > > Your last example uses GET_V2_DOMAIN_INDEX_TABLES,
> > with arguments that
> > > reference an attacker-defined package with a
> > (modified?)
> > > ODCIIndexUtilGetTableNames function.
> > >
> > > Is this a surface-level discrepancy, or is your
> > vector substantively
> > > different than the one in the exploit?  If these
> > are different, then
> > > is it possible that last week's exploit was
> > actually fixed?
> >
> > No; the same problem occurs. This is the kind of
> > general problem I'm
> > speaking about. Most vendors that actually
> > understand security will look for
> > other bugs in the same functional area if you point
> > out a bug. IMO, my job
> > as a security vulnerability researcher is to
> > highlight problem areas - i.e.
> > areas of functionality that are rife with issues.
> > How can Oracle fix one
> > issue but miss the same flaw two lines later??? In
> > this case though, we're
> > not just talking about one flaw but several. Really,
> > it is inconceivable,
> > yet they, somehow, manage to do it.
> >
> > God forbid that any of our critical national
> > infrastructure runs on this
> > product.... oops it does :(
> >
> > And every version from 8 through 9 to 10 release 2
> > is vulnerable. That's
> > every supported version of Oracle on every operating
> > system.
> >
> > Oracle customers: honestly - Oracle are not going to
> > listen to the likes of
> > me - but they will listen folks like you. If you're
> > not happy with the
> > response you're getting from Oracle then get on the
> > 'phone - call them up
> > and tell them that you're not happy. Please, demand
> > improvements.
> >
> > By the way, this is not an isolated incident. I have
> > many examples to hand
> > where Oracle have tried to fix problems in the same
> > functional area but only
> > whitewashed it. They should be proactively looking
> > for similar issues in the
> > same code just like Microsoft does.
> >
> > The "champion of quality coding movement"
> > (http://www.cio.com/archive/031505/security.html) ,
> > who "applauds ethical
> > hacking", asks "Why isn't that standard development
> > process?"
> >
> > I don't know... but I don't think we'll find out in
> > the two year time frame
> > posited; we've got less than a year to go.
> >
> > >
> > > - Steve
> > >
> > > P.S. For those of you who are paying attention at
> > this excruciating
> > > level of detail, it seems that David's original
> > use of
> > > GET_DOMAIN_INDEX_METADATA in 2004 directly
> > included the code in the
> > > NEWBLOCK argument, whereas last week's exploit was
> > performed through
> > > an indirect reference to the code in the TYPE_NAME
> > argument.
> >
> > p.p.s.
> >
> > Just to clarify the issues:
> >
> > GET_DOMAIN_INDEX_TABLES
> > GET_DOMAIN_INDEX_METADATA
> > GET_V2_DOMAIN_INDEX_TABLES
> >
> > are all vulnerable to the exploit.
> >
> > Cheers,
> > David Litchfield
> > NGSSoftware Ltd,
> > http://www.ngssoftware.com/
> > +44 (0) 208 401 0070
> >
> >
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Tired of spam?  Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ