Oracle’s Much-Ballyhooed Data Redaction Feature in Database 12c, is Easy to Subvert without Needing to Use Exploit Code, Attendees at Defcon 22 in Las Vegas Have Heard.
The Redaction Features in 12c are Designed to Automatically Protect Sensitive Database Material by Either Totally Obscuring Column Data or Partially Masking it – for Example, Recalling just the Last 4 Digits of a US Social Security Number When a Search Query is Run.
But, according to David Litchfield, Security Specialist at Datacomm TSS and the Author of The Oracle Hacker’s Handbook, the Mechanism is so Riddled with Basic Flaws that, you Don’t Even Need to Execute Native Exploit Code to Defeat the Redaction – Some Clever SQL is All that's Needed, we're Told.
“If Oracle has a decent security development lifecycle in place anyone would have found these flaws and stopped them in tracks”, Litchfield Said.
“Anyone with a modicum of SQL would have found these bugs.”
Litchfield Said that, within 5 Minutes of Investigating the Redactions System, he Found Serious Flaws in the Coding. He's Previously Documented his Findings here [PDF - Source below].
He Demonstrated How with Some Simple Keystrokes an Evil Employee – or Someone Able to Inject SQL Queries Remotely – Could Gain Sufficient Privileges to Defeat Data Redaction and Get Access to the Information in the Database.
He Mocked Oracle Boss, Larry Ellison’s Assertion in January that, No One had Hacked an Oracle Database in 2 Decades to his Knowledge. Litchfield Claimed that, the 2011 Sony PLAYSTATION Network Hacking Attack that Took the Network Offline for Nearly 2 Months was Traced Back to an Oracle Database.
As a Security Researcher, Litchfield Said, he Always Reported Flaws to Vendors as he Found them. But, he Expressed Frustration that, Oracle was Slow to Patch and When it did Get Around to Issuing Fixes they were Either Broken or Incomplete.
Typically, Oracle Engineers will Patch against Exploit Code, rather than Fixing the Fundamental Flaw, he Told the Defcon Audience on Friday.
This Isn't a Good Approach since Small Changes to Exploit Code May Defeat the New Protections.
Litchfield Pointed to Microsoft as an Example of What Could be Done in Database Security. In the Wake of the Bill Gates Security Memo, the Entire SQL 2005 Development Team Stopped Work and Went Over Old Code with a Security Review.
The Result Down the Line was that Patching and Flaw Detection in Microsoft SQL Dropped Sharply and the Code Security of IIS and Exchange has also been Much Improved. Oracle Should Take a Leaf Out of Redmond’s Book When it Comes to Security, he Suggested and Customers should Demand Change.
“If you're running Oracle database servers and don't like the way they are treating you on security, then get on the phone to them, because we really need to get this sorted”, he Concluded.
It's Understood Oracle Hasn't Fully Patched the Bugs Described by Litchfield. The Database Giant Wasn't Immediately Available for Comment.
Info Sources:
http://packetstorm.foofus.com/papers/database/Oracle_Data_Redaction_is_Broken.pdf
https://blogs.oracle.com/securityinsideout/entry/data_redaction_new_in_oracle
https://www.defcon.org/html/defcon-22/dc-22-speakers.html#Litchfield
quinta-feira, 14 de agosto de 2014
Oracle Database 12c's Data Redaction Security, Smashed Live on Stage
12:54
No comments
0 comentários:
Enviar um comentário