Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Databases Programming Software Security Worms IT

Oracle 'Worm' Exploit Modified 87

answers writes "Two months after an anonymous researcher released the first public example of an Oracle database worm, the exploit code has been advanced and republished, adding new techniques to attack databases. From the article: "It's still very theoretical right now, but I don't think any DBA should be underestimating the risk," said Alexander Kornbrust, CEO of Red-Database-Security GmbH. "If you're running a large company with hundreds of valuable databases, a worm can be very destructive. It is very possible to use this code to release a worm. I can do this right now if I wanted to.""
This discussion has been archived. No new comments can be posted.

Oracle 'Worm' Exploit Modified

Comments Filter:
  • yeah. (Score:4, Funny)

    by User 956 ( 568564 ) on Saturday January 07, 2006 @11:27AM (#14416985) Homepage
    It is very possible to use this code to release a worm. I can do this right now if I wanted to.""

    That seems like an odd quote. Did the author of the article like Double-Dog dare him, or something?
    • "It is very possible to use this code to release a worm. I can do this right now if I wanted to." And I could walk right into a bank and hold it up right now if I wanted to.
      • Re:yeah. (Score:3, Funny)

        by daikokatana ( 845609 )
        And I could walk right into a bank and hold it up right now if I wanted to.

        You posted this on a Saturday at 4:46PM - sorry, 'fraid not, the banks are all closed...

    • Not so strange given he's from a database security company. "Now, it'd be a shame if something happened to your database, wouldn't it?"
    • Re:yeah. (Score:5, Funny)

      by hey! ( 33014 ) on Saturday January 07, 2006 @11:54AM (#14417081) Homepage Journal
      Odd? Nah, it must sounds awkward because it was edited for brevity. The full quote was:

        It is very possible to use this code to release a worm. I can do this right now if I wanted to. Mwahahaha!
    • Did the author of the article like Double-Dog dare him, or something?

      Perhaps a slight breach of etiquette occurred by skipping the triple dare and going right for the coup de grace of all dares, the sinister triple-dog-dare. But I can't be certain.
    • Possibly triple-dog by those words!
  • firewalls? (Score:5, Insightful)

    by mtenhagen ( 450608 ) on Saturday January 07, 2006 @11:28AM (#14416988) Homepage
    How many oracle db's are connected directly to the internet? Even within most company's their isnt a direct connection option to the db but only thru an application.

    Of course this is an exploit but the impact shouldn't be overrated.
    • In a perfect world, yes. But in this one, people even leave their Electric Bong [computerworld.com] directly connected to the internet. (So they can switch the bong off remotely while having an out-of-body experience??)
    • by mosel-saar-ruwer ( 732341 ) on Saturday January 07, 2006 @11:50AM (#14417072)

      How many oracle db's are connected directly to the internet? Even within most company's their isnt a direct connection option to the db but only thru an application.

      Here you begin to enter the realm of the professional cracker [apologies to chef [southparkstudios.com]], my little padawan novitiate.

      The professional employs something like the WMF vulnerability to crack the client OS, and then uses the client application to crack the DB.

      And when he's seen what he needs to see, the professional tidies up and removes any evidence of his intrusion.

      In all seriousness, the PRC Red Army's "TITAN RAIN" operation is more than a little troubling in this regard:

      The Invasion of the Chinese Cyberspies
      (And the Man Who Tried to Stop Them)

      ...The hackers he was stalking, part of a cyberespionage ring that federal investigators code-named Titan Rain, first caught Carpenter's eye a year earlier when he helped investigate a network break-in at Lockheed Martin in September 2003. A strikingly similar attack hit Sandia several months later, but it wasn't until Carpenter compared notes with a counterpart in Army cyberintelligence that he suspected the scope of the threat...

      http://www.securityteam.us/article.php/20050829200 849601/print [securityteam.us]

      http://it.slashdot.org/article.pl?sid=05/08/28/174 5245 [slashdot.org]

    • within most company's their isnt a direct

      *head explodes*

    • How many oracle db's are connected directly to the internet? Even within most company's their isnt a direct connection option to the db but only thru an application.

      Of course this is an exploit but the impact shouldn't be overrated.


      First, it's not an exploit but merely a try-8-default-accounts code. Poor coding style too, I have to say...but someone seems very proud of it???

      What's really interesting about this worm is that it's written in PL/SQL, i.e. it runs on an ORACLE server itself. If it was really cle
    • Re:firewalls? (Score:3, Insightful)

      by legirons ( 809082 )
      "How many oracle db's are connected directly to the internet?"

      Shouldn't that be "how many oracle db's are connected directly to computers which might get infected with a virus"?

      e.g. plenty of firewalled LANs got CodeRed, Sasser, etc. (including that nuclear power station which nobody thought was internet-connected)
      • > including that nuclear power station which nobody thought was internet-connected

        It wasn't internet-connected. Some IT dude brought the virus in on his laptop. (Not that this doesn't make the incident less dangerous. A determined attacker could infect an employee at home, and then undermine the security of the corporate network / nuclear power plant as an insider. Difficult, but scary!)
        • It [power station] wasn't internet-connected. Some IT dude brought the virus in on his laptop.

          I suspect we may be arguing similar things here, but:

          "Internet connected" in the virus-containment sense, means things which process data which originated on the internet. Whether that happens via a router, or ethernet cable, or firewall, or laptop, or USB key, or someone typing it in, is somewhat irrelevant, so long as data can travel from one to the other.

          Maybe "indirectly internet-connected" would be a better
      • > e.g. plenty of firewalled LANs got CodeRed, Sasser, etc.

        Sasser (the MS-SQL worm) also targetted a lot of desktop configurations, due to the fact that certain versions of MS-Office come MSDE, a cut-down MSSQL. I don't know how many people run "deskop Oracle", but I suspect it's pretty tiny compared to MSDE.

        Also, unlike MS-SQL, Oracle is pretty much non-existant in the small business space where networks and patching are haphazard. Your typical Enterprise Oracle install is firewalled up the wazoo.
  • Backup Data? (Score:5, Insightful)

    by Artie Dent ( 929986 ) on Saturday January 07, 2006 @11:34AM (#14417004) Homepage
    It seems that any "valuable database" would be sufficiently backed up in non-attackable media. So while it probably could create a lot of hassle, I'd have a hard time seeing this worm bringing down companies.
    • It seems that any "valuable database" would be sufficiently backed up in non-attackable media. So while it probably could create a lot of hassle,

      Oracle databases can get rather large, and are used in real-time transactional environments. Do you have an idea how long it would take to restore, say, 900GB of data from backups, and how much money would be lost while the Oracle database would not be able to process transactions for the company?

      • Around 2-4 hours for the restoration itself, plus an hour to shut down the applications that are using the database during the restore and to restart them afterward, plus up to 8 hours for the discovery of the attack and to organize the restoration procedures, and if the attack were discovered at night or on a weekend you'd need even more time to wake up or track down the DBA, CTO, and/or VP of IS.

        Just a rough estimate.
        • 2-4 hours for a restore of a 900 gigabyte database? From my experience I'd say that sounds overly optimistic, but of course the time taken to restore is highly dependent upon your database architecture, infrastructure and backup plan.

          Is that from tape? optical media? cartridge? Disk? Is that a hot or a cold backup? Is it rman, or some other backup tool, or just a copy of the underlying file systems?

          • 900GB at 4 hours would require a data transfer rate of 512 Mb/s. I'm guessing he spouted off the numbers for his system.
          • 900GB can fairly easily be split across two hard disks these days. I would probably set up such a system using a hardware RAID-1 system. Every night, you plug in two more disks, tell it to re-build the array. You remove the old disks to a fire safe somewhere else. You have enough disks to do this on a rolling program over a week (at an absolute bare minimum. You should also keep at least one drive a week for a month or two).

            As the database runs, you write a copy of the transaction log to a DVD-R (or o

        • [To restore a 900GB database] Around 2-4 hours for the restoration itself, plus an hour to shut down the applications that are using the database during the restore and to restart them afterward

          I think you underestimate the restore time. I've been involved in some Oracle restore tests recently, and there are some twists you're not considering. First, what's the backup strategy? Many databases are not backed up 100% every day; more typical is a full backup every 14 days with incremental backups in betwee

        • First of all, your estimate sounds VERY optimistic.

          Second of all, the fact that you're thinking in terms of "oh, it's only a few hours" suggests to me that you've never worked for a company where every minute costs an incredible amount of money. Multiply each hour you need with a few million dollars, and you'll be starting to see why this can be a big deal.

    • Re:Backup Data? (Score:5, Insightful)

      by KiloByte ( 825081 ) on Saturday January 07, 2006 @11:48AM (#14417060)
      You're assuming that they are run by competent people -- and this is a thoroughly false assumption.

      If I combine everyone from my company and all companies we cooperate with, I can name only two people who consider backups to be anything but an annoying waste of time some pessimists are blabbing about in order to suck in some of their money.
      Redundant hardware runs against the principle of cutting costs; no bean counter would even consider investing in data integrity.

      When I tell people that I installed a script that will back up the most valuable part of the data and dump them to a remote location, the reaction is like: uh, cool, but what if it breaks things?
      • by Anonymous Coward

        As a consultant, I once nearly destroyed 2 years worth of a companies research data my first week on the job.

        I ran some perl script that they had written against a test database to update some stuff. Unfortunately, it turns out that the real database address was hardcoded deep in the Perl, and I hadn't understood this. The DB admin complained after it had run about 5 minutes updating (incorrectly) their multi-gigabyte database that access to the database was slow. So I immediately hit ^C and said, "OK,

    • Re:Backup Data? (Score:3, Interesting)

      by DrSkwid ( 118965 )
      how would you know if it's been changed ?

    • Re:Backup Data? (Score:3, Interesting)

      by Godeke ( 32895 ) *
      It seems that any "valuable operating system" would be sufficiently backed up in non-attackable media. So while it probably could create a lot of hassle, I'd have a hard time seeing this worm bringing down companies.

      I changed that one quoted term to make a point: if we aren't going to be concerned here, why be concerned about all those other worms. Oh, I know... perhaps because having your servers in an unusable state while performing recovery is a bad thing which can cause serious financial and reputation
    • It seems that any "valuable database" would be sufficiently backed up in non-attackable media.

      Unless the worm modified some data which got backed-up. A week later, the untainted backups would be history.

      (And even if you kept monthly backups, who's going to try restoring them without losing a month's work for the whole company?)
  • by kpharmer ( 452893 ) on Saturday January 07, 2006 @11:41AM (#14417033)
    This attack relies on default userids & passwords, not on any vulnerability. Oracle used to use default scott/tiger userid/passwd. I think it still does in 10g, but I'm not positive.

    Given enough databases, someone will forget to change these. For that reason any shop with more than a half-dozen databases should be using some kind of application policy-checker that will automatically test for this kind of a policy violation.
    • Oracle used to use default scott/tiger userid/passwd. I think it still does in 10g, but I'm not positive.

      Nope, scott/tiger is deprecated -- the current sample schemas are separated into multiple users, and they are all disabled by default. These users are installed by default, but it's not hard to tell Oracle to not install them.

      Of course, there's a lot of non-10g databases out there. Heck, there's a lot of pre-8i databases out there still even though you have to pay an arm, leg, and torso for support, if y
    • I haven't taken a close look at this version of the worm but I know the last version could not propagate itself. You would need a 'cracker' on the inside of your network to launch the code. Oracle 10g has a built-in policy checker which notifies you of a host of problems such as grants to public, default passwords, etc. Also, in any good application design, the database is not accessible to the public. In a 3 tier application the only server the db should accept database connections from is the app ser
      • by Anonymous Coward
        So which is more probable, from a 'cracker' or from "the DBA workstation through a Windows vulnerability, gain access to that local machine and use the Oracle worm as a payload to cause damage?"

        Since when does a windows vulnerability (or other network security failure) qualify as a weekness in Oracle?

        If the System administrators don't do their job, you don't have a system anyway.
    • If you were a Sr. DBA or DB architect being paid triple figures. Deleting those accounts would be done with [i]your[/i] schema setup/install scripts. It would be second nature to secure the DB at the install (as taught in many Oracle adv. DBA classes).

      "[i]"It's still very theoretical right now"[/i]

      I'm sorry for possibly flaming now, but this is FUD from GmbH firm to a US firm. Informational yes, serious not really (for enterprises that is).

      • > If you were a Sr. DBA or DB architect being paid triple figures. Deleting those accounts would be done
        > with [i]your[/i] schema setup/install scripts. It would be second nature to secure the DB at the
        > install (as taught in many Oracle adv. DBA classes).

        Sure, but many databases are installed by extremely junior personnel. Sometimes somewhat-embedded within an application, at other times stand-alone.

        I've found as a sr. dba that setting up a dozen secure databases to be a challenge without tools t
  • Article summary (Score:1, Redundant)

    by mangu ( 126918 )
    Either change the "tiger" password or use an account other than "scott" to do any important job. TFA doesn't say much about the worm, they only mention that it uses the default usernames and passwords. Nothing to see around here, next story, please...
  • What would be the difference between a website displaying a "security bulletin" versus a website asking for "opensource virus collaboration"? I think there is a fine line between warning the public and informing virus authors. said Alexander Kornbrust, CEO of Red-Database-Security GmbH. "If you're running a large company with hundreds of valuable databases, a worm can be very destructive. It is very possible to use this code to release a worm. I can do this right now if I wanted to." The easier a bug is to
    • The problem comes when software vendors don't take heed of your warning that their product has vulnerabilities. The longer they sit on the information without producing a patch, the greater the chances for a zero-day exploit.

      Do you really think there aren't organizations out there with similar resources to this company whose aims are finding vulnerabilities like these for the purposes of exploiting them?

      If he can find it, someone else can. Informing the public that an exploit exists increases pressure on
  • Blackmailing Oracle (Score:3, Interesting)

    by Xemu ( 50595 ) on Saturday January 07, 2006 @12:08PM (#14417142) Homepage
    Alexander Kornbrust, CEO of Red-Database-Security GmbH. "...It is very possible to use this code to release a worm. I can do this right now if I wanted to." (emphasis mine)

    Doesn't this sound very much like something a blackmailer would say?

    Alexander is an ex-Oracle employee. I wonder if he was let go because of his poor judgement.

  • obZealotry (Score:1, Redundant)

    by sheldon ( 2322 )
    This clearly means all Oracle users must switch to Apple Macintosh.

    • No they should switch to *BSD. No wait, I mean Linux. Err, GNU/Linux. No, hang on, they should switch to a Beowulf cluster of Soviet Russia, no-one will ever manage to crack that.
  • by DeltaHat ( 645840 ) on Saturday January 07, 2006 @12:45PM (#14417292) Homepage
    It is very possible to use this code to release a worm. I can do this right now if I wanted to.

    MICHAEL
    I'm gonna find out the hard way that I'm not a pussy if they don't start treating us software people better.

    SAMIR
    That's right.

    MICHAEL
    They don't understand. I could come up with a program that could rip that place off big time...big time.

    PETER
    Yeah.
  • If you were a serious Oracle DBA you have installed the database and do a check-up to see if the things is secure at a acceptable level (default passwords removed, logs enabled, firewall protected). I see a lot of amateur installing databases and when it is usable there's no need to update or do security checks.
    • > If you were a serious Oracle DBA you have

      Sure, but look at all the non-skilled labor now doing this work. Whether due to outsourcing, attempts to save labor money, etc - I see a ton of very junior people doing installs. The major databases now have install wizards that are pretty good - and allow complete amateurs to install the product. This is great. But these folks have no idea how to lock down the database once they've installed it.

      And think beyond oracle to mysql - where almost no dbas install
      • Yes, it's all about money. Why I need to put a senior DBA to install a Database if there is a lot of juniors that only need to click "Next, Next and Finish".
  • My 2 Cents (Score:1, Insightful)

    by Anonymous Coward
    SQL injection [wikipedia.org] is a bigger issue against any DB.

    Regardless of the exploit taken, if the DB is properly configured and secured the only "lost" of data should be against the schema being attacked. And then you can use Oracle's Flashback [oracle.com] technology to roll back that one transaction - if caught in time.

    True loss of data means the DBA did not do their job. Of course, this is usually, in my experience anyway, the fault of managment and the business - budget/time/resources.

  • In the article by red database security [red-databa...curity.com] it's stated that Google has allready blocked the Full Disclosure mailing list article refering to the sploit, and a request to it, "http://www.google.de/search?hl=en&q=startc0GtJBi1 +full-disclosure&btnI=I%27m+Feeling+Lucky", results in a message by google stating "We're sorry... but we can't process your request right now. A computer virus ...", but if you change the request, eliminating the "hl=en" parameter you get the Full Disclosure mailing list article,

To be awake is to be alive. -- Henry David Thoreau, in "Walden"

Working...