Sat, May 17, 2025
Log in Register

Login to your account

Username
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name
Username
Password *
Verify password *
Email *
Verify email *
Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1

TOPIC: Oracle’s data redaction security trashed at Defcon 23

Oracle’s data redaction security trashed at Defcon 23 10 years 8 months ago #29132

  • qvjglxinf
  • qvjglxinf's Avatar
  • OFFLINE
  • Expert Boarder
  • Posts: 90
  • Karma: 0
Oracle Corporation s Database 12c has at the in Las Vegas, where a researcher has demonstrated how easy it is to subvert its much-hyped data redaction feature.
David Litchfield, author of The Oracle Hacker s Handbook and a security specialist at Datacomm TSS, that Database 12c s data redaction feature is so vulnerable that it can be hacked even without exploit code – because its own code is so riddled with flaws.
Database 12c s data redaction feature is designed to mask sensitive information in the database either by fully obscuring or partially masking said information. An example of this is it would only show up the last four digits of someone s credit card number when a search is initiated.
But all that s needed to crack it is a little bit of knowledge in SQL, claims Litchfield.
“If Oracle has a decent security development lifecycle in place anyone would have found these flaws and stopped them in tracks,” he said. “Anyone with a modicum of SQL would have found these bugs.”
Litchfield said that he found several serious flaws in Oracle s code within just five minutes of investigating the data redaction feature, and has . On stage, he demonstrated how anyone – either an employee or someone who can gain remote access to inject SQL queries – can give themselves the privileges necessary to get past data redaction and access all of the data its locked away.
During his talk, Litchfield also called out Oracle CEO Larry Ellison s previous claims that Oracle s database hasn t been hacked in two decades. He said that the famous Sony PlayStation Network hack back in 2011 was achieved by hacking Oracle s database.
Explaining why he likes to target Oracle so much, Litchfield told his audience that his main motivation was that Oracle is painfully slow to patch exploits when it s made aware of them. Even worse, its fixes are often incomplete as Oracle s engineers will usually patch the exploit code rather than addressing the fundamental flaw.
Litchfield highlighted Microsoft s approach to database security as the way forward. He said that its entire Microsoft SQL 2005 development team was ordered to review the software s code in a security from Bill Gates, something that led to a huge drop in patching and flaw detection. Litchfield advised Oracle to follow Microsoft s approach, and further says that customers should demand it do so.
“If you re running Oracle database servers and don t like the way they are treating you on security, then get on the phone to them, because we really need to get this sorted,” he said.
Oracle has yet to address the bugs described by Litchfield at the time of writing.
photo credit: via
The administrator has disabled public write access.
  • Page:
  • 1
Time to create page: 0.303 seconds

Search Forum

Keyword

Forum Login

My Recent Threads

  • No posts to display.

Forum Menu

Contact Us

Contact us today. We'd love to hear from you!!

Mail Us
This email address is being protected from spambots. You need JavaScript enabled to view it.


Phone
484-769-1653


Location
Berks County, Pa.

Some of Our Clients:

Now Offering Photo Booth Poster Collages!!

 

Another Event to Remember!

Call Us To Book Yours
484-769-1653