|There are 74 visitors online|
I got an email from Jakub Wartak a few days ago but due to travelling last week in Sweden to teach my class "How to perform an Oracle database security audit" I have not had time to look at it until today. Last week was great in Stockholm as I was able to meet Patrik Karlsson - cqure.net and 0rm - Toolcrypt.org - orabf for a good chat and some beers.
Back to Jakubs post. He has made a post on his blog titled "Oracle Database Vault, not so 0-day anymore, privilege escalation using ptrace(2) from UNIX account" that describes a C program - ora_dv_mem_off.c that can be used to bypass database vault.
This bug highlights, the author states, the fact that database vault does not protect DBA access where the DBA has operating system accounts.
It is an interesting post with some detailed C code exploiting the use of ptrace() to access data and turn off DV. This post somewhat reminds me of what Tanel Poder did over a year ago with the hack to fix the SYSDBA flag (bit) in the PGA using the _oradbg_pathname parameter to call an external debugger to flip the bits.
Nice post Jakub.
This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.
Home and Archives
Other useful blogs
Syndication - Feeds