The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."
References
Link | Resource |
---|---|
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ | Press/Media Coverage |
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular | Press/Media Coverage |
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html | Press/Media Coverage |
http://www.exploit-db.com/exploits/22069 | Exploit Third Party Advisory VDB Entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Broken Link |
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/55651 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2012-09-21 23:55
Updated : 2016-11-28 19:08
NVD link : CVE-2012-3137
Mitre link : CVE-2012-3137
CVE.ORG link : CVE-2012-3137
JSON object : View
Products Affected
oracle
- primavera_p6_enterprise_project_portfolio_management
- database_server
CWE
CWE-287
Improper Authentication