The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ - Press/Media Coverage | |
References | () http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular - Press/Media Coverage | |
References | () http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html - Press/Media Coverage | |
References | () http://www.exploit-db.com/exploits/22069 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Patch, Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/55651 - |
Information
Published : 2012-09-21 23:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3137
Mitre link : CVE-2012-3137
CVE.ORG link : CVE-2012-3137
JSON object : View
Products Affected
oracle
- primavera_p6_enterprise_project_portfolio_management
- database_server
CWE
CWE-287
Improper Authentication