Vulnerability
see below
Affected
Oracle (7x?)
Description
Matthew G. Harrigan posted following. The sqlnet client program
accepts command-line parameters for username, and password. It's
something like:
sqlnet user/password@INSTANCE_NAME
so, in order to gain unauthorized access to the database, all one
has to do is grep through the machines proc list.
On another note database authentication mechanism appears to do a
regular expression on the account name for /^sys/ before
authenticating it, and upon a match, assigning system level
access to that accou nt. For example if your account name is
sysdood or sysenor, oracle assumes you are infact system, and
logs you in as such.
Solution
Notning yet.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH