Oracle JavaVM Database Takeover

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

A new vulnerability discovered in the Oracle Database JavaVM component can result in complete database compromise and shell access to the underlying server.

Background

Oracle released an out-of-band update to its flagship database product for an authenticated vulnerability in the JavaVM component. According to Oracle, the vulnerability “can result in complete compromise of the Oracle Database and shell access to the underlying server.” The same issue was found and patched in the July 2018 critical patch update (CPU) but was not reported as a critical vulnerability for unspecified reasons.

Vulnerability details

According to Oracle, this vulnerability affects “…versions 11.2.0.4 and 12.2.0.1 on Windows. CVE-2018-3110 has a CVSS v3 base score of 9.9, and can result in complete compromise of the Oracle Database and shell access to the underlying server. CVE-2018-3110 also affects Oracle Database version 12.1.0.2 on Windows as well as Oracle Database on Linux and Unix, however patches for those versions and platforms were included in the July 2018 CPU.”

This vulnerability affects Windows Oracle databases via the “Oracle Net” protocol and requires a user with “Create Session” privileges for the JavaVM component. No credit was provided in the advisory and, as is often the case with many Oracle vulnerabilities, exploitation details are sparse.

Note: CVE-2018-3004 from the July CPU appears to be related, since the same component is affected. However, Oracle does not provide a solid link between the vulnerabilities.

Impact assessment

Because database authentication is required to exploit this vulnerability, the impact is lessened. However, the potential for complete database takeover means anyone with an Oracle database in their environment should take remediation steps immediately. In addition, enterprises running versions of Oracle DB which were patched for the July CPU are already protected.

Urgently required actions

If your business uses an Oracle database, we recommend updating immediately based on Oracle’s guidance

Tenable.io Vulnerability Management, Tenable.io Container Security, SecurityCenter and Nessus detect this vulnerability. Below is a list of plugins Tenable has released to determine if the Oracle databases in your environment are affected. Tenable will continue to monitor the situation and provide updated protection as required.

Plugin ID

Name

Description

111219

oracle_rdbms_cpu_jul_2018.nasl

July 2018 Oracle DB CPU

111680

oracle_rdbms_cve_2018_3110.nasl

August 2018 Oracle DB check for CVE-2018-3110

Learn more:

Learn more about Tenable.io, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
1607 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel