CVE-2012-3137

The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."
References
Link Resource
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ Press/Media Coverage
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular Press/Media Coverage
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html Press/Media Coverage
http://www.exploit-db.com/exploits/22069 Exploit Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Patch Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch Vendor Advisory
http://www.securityfocus.com/bid/55651
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ Press/Media Coverage
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular Press/Media Coverage
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html Press/Media Coverage
http://www.exploit-db.com/exploits/22069 Exploit Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Patch Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Patch Vendor Advisory
http://www.securityfocus.com/bid/55651
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ - Press/Media Coverage () http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ - Press/Media Coverage
References () http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular - Press/Media Coverage () http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular - Press/Media Coverage
References () http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html - Press/Media Coverage () http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html - Press/Media Coverage
References () http://www.exploit-db.com/exploits/22069 - Exploit, Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/22069 - Exploit, Third Party Advisory, VDB Entry
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link
References () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Patch, Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/55651 - () http://www.securityfocus.com/bid/55651 -

Information

Published : 2012-09-21 23:55

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3137

Mitre link : CVE-2012-3137

CVE.ORG link : CVE-2012-3137


JSON object : View

Products Affected

oracle

  • primavera_p6_enterprise_project_portfolio_management
  • database_server
CWE
CWE-287

Improper Authentication