The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."
References
Link | Resource |
---|---|
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular | Press/Media Coverage |
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ | Press/Media Coverage |
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html | Press/Media Coverage |
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html | Patch Vendor Advisory |
http://www.exploit-db.com/exploits/22069 | Exploit Third Party Advisory VDB Entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Broken Link |
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/55651 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2012-09-21 16:55
Updated : 2016-11-28 11:08
NVD link : CVE-2012-3137
Mitre link : CVE-2012-3137
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
oracle
- primavera_p6_enterprise_project_portfolio_management
- database_server