Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Database

    Researcher: Oracle Passwords Crack in Mere Minutes

    By
    Lisa Vaas
    -
    October 31, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Attackers can easily crack even strong Oracle database passwords and gain access to critical enterprise data because of weak password protection mechanisms, researchers have warned.

      In the most recent of Oracles security woes, Joshua Wright of the SANS Institute and Carlos Cid of the Information Security Group at the University of Londons Royal Holloway college on Wednesday gave a presentation on their findings at the SANS Network Security conference in Los Angeles.

      The duos paper, “An Assessment of the Oracle Password Hashing Algorithm,” calls for Oracle to bolster its password hashing mechanism.

      As it now stands, malicious users can recover even strong, well-constructed passwords within minutes, the researchers have found.

      It is only the most recent of a long run of security embarrassments for the database company that cooked up the marketing tag “unbreakable”—a brag that it has quietly stepped back from ever since its inception.

      In the past few years, security researchers have complained that Oracle has sat on vulnerabilities for unforgivably long stretches of time; that Oracles opatch utility is misleading enterprises regarding their patch levels; and that its quarterly CPUs (Critical Patch Updates) have consistently failed to fix the problems they were meant to fix.

      Oracle on Friday evening e-mailed a statement saying that “Security is a matter we take seriously at Oracle and, while we stand firmly behind the inherent security of our products, we are always working to do better.”

      The statement went on to give details on the password hash weakness and to stress that access to a table containing password hashes should be strictly controlled.

      “The paper published by SANS exposes the location in the Oracle data dictionary where the Oracle password hashes are stored,” the statement reads. “By default, access to this table is restricted to a limited number of highly privileged database users. As recommended by Oracle, access to the Oracle DBA role; the SELECT ANY TABLE privilege; and the SELECT ANY DICTIONARY privilege should be tightly controlled.”

      Oracle also said that the weaknesses can be mitigated by good password management. “We feel strongly that the issues noted in the paper can be addressed through good password policy management, which dramatically reduces the inherent security risks associated with any password-based authentication system, and through use of security features included with the Oracle database, such as facilities to enforce password complexity, account lockout after multiple login failures and password expiration,” the statement said.

      “Good enterprise password policies will dramatically reduce the inherent security risks associated with any password-based authentication system,” Oracle said.

      Wright and Cids research has revealed that Oracles password handling has multiple weaknesses: weak password salt selection, lack of alphabetic case preservation and a weak hashing algorithm.

      Salt is a small, usually random value used in conjunction with a password to generate whats called a password hash. Salted passwords that are long enough work to gum up attacks that use automated lookup with password dictionaries, since it becomes impractical to compute a large table of hashes that correspond to possible passwords and salt value combinations in advance.

      Oracles password hashes join user names to passwords before calculating the hash—a non-conventional method for salt selection. The researchers found a number of weaknesses with this unorthodox method.

      One such weakness is that its possible to crack a user password thats based on a hash value and another users known credentials. By inspecting password hash values from the dba_users table, the method of salt generation is quite easy to ascertain, as the researchers demonstrated in an example, partially recreated here:

      SQL> create user Oracle identified by password;
      User created.
      SQL>create user Oracl identified by epassword;
      User created.
      SQL>select username, password from dba_users where username like ORACL%;

      The researchers discovered another salt weakness in the use of non-random salt values. While the salt can still slow down a precomputed dictionary attack against a large password hash table, an attacker is still capable of precomputing a table of possible passwords using a common username, such as SYSTEM.

      Oracles password protection hashing also lacks alphabetic case preservation. Before it calculates a password hash, the hashing mechanism converts a users password to all uppercase, regardless of how it is input.

      /zimages/5/28571.gifOpen-source databases are multiplying like rabbits. Click here to read more.

      This weakness reduces the number of possible passwords an attacker has to sift through in order to find an effective one. It also means that enterprises are less secure than they might assume when it comes to the quality of their passwords, the researchers said.

      When it comes to Oracles hashing algorithm, which Oracle doesnt openly document, the researchers nonetheless found ample online and printed references to enable them to reproduce it.

      For example, they found a 1993 post on the comp.databases.oracle newsgroup that described the algorithm in detail, identifying an unknown fixed key as an input parameter. That unknown key value was later published in the book “Special Ops.”

      The researchers go on to describe the algorithm in their paper.

      Although they didnt discover cryptographic weaknesses in the algorithm, the researchers identified what they call a “significant computational weakness” in that Oracles one-way algorithm requires a scant amount of DES encryptions to compute a hash value.

      Passwords have several options to obtain password hashes, the researchers said. They can capture unencrypted Oracle TNS (transport network substrate) traffic, or they can exploit vulnerabilities in applications that permit SQL injection.

      If an attacker has local access to the databases operating system, he or she can also examine the SYSTEM tablespace file or the oraPW file with a tool such as the Unix strings utility to locate password hashes and associated user names.

      Once an attacker discovers one or more user names and password hashes, they can then use the hashing algorithm to mount an attack to recover user passwords.

      To protect Oracle databases, the researchers recommend strong password selection policy and appropriate restriction of access privilege.

      Beyond that, enterprises should use non-privileged users for Web applications, giving only minimum privileges to run the application. Users that are members of the DBA group shouldnt be allowed to run Web applications exposed to public or less-privileged users, they said.

      The researchers also recommend using a tool to help identify users who have access to tables in which password hashes are stored. They recommend one such as who_can_access.sql, created by Pete Finnigan, a noted security researcher.

      They also suggest auditing the SELECT statements in the DBA_USERS view that can be used to obtain password hashes. Encrypting TNS traffic—an option included in the Oracle Advanced Security package for Oracle Enterprise Edition—is also a good idea, they said. Those who are running other editions can still use SSL tunneling features with tools such as OpenSSH or stunnel.

      Wright and Cid also recommend enforcing a minimum password length—the length of which is dependent on whether attackers have resources such as optimized DES-cracking hardware—and a password expiration date that lapses at or before 60 days.

      Editors Note: This story was updated to include Oracles statement.

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest database news, reviews and analysis.

      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. Since 1995, she has also been a Webcast news show anchorperson and a reporter covering the IT industry. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection. Prior to becoming a journalist, Vaas experienced an array of eye-opening careers, including driving a cab in Boston, photographing cranky babies in shopping malls, selling cameras, typography and computer training. She stopped a hair short of finishing an M.A. in English at the University of Massachusetts in Boston. She earned a B.S. in Communications from Emerson College. She runs two open-mic reading series in Boston and currently keeps bees in her home in Mashpee, Mass.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×