New worm variant exploits Oracle errors

New worm variant exploits Oracle errors Picture 1 The malicious code has the ability to exploit security vulnerabilities and cause serious damage to previously distributed Oracle database software that has been widely modified and redistributed on the Internet, ringing a scene ring. New report about a new attack.

Thus, just two months after an unnamed researcher first published an example of an attack computer worm exploiting a security vulnerability in Oracle database software, this malicious code was researched and improved to redistribute through the list of Full Disclosure email. Again a new technique to attack this database system.

However, Alexander Kornbrust, executive director of database security firm GmbH, said: 'These kinds of attacks are still theoretical and I don't think that the applications The database may be threatened because of risks like this. If you are managing a large company with hundreds of valuable databases, this code is really a destroyer. This malicious code is likely to be used to develop into a complete worm. Being careful is probably the best thing to do '

Kornbrust - an expert well known for Oracle's security research products - thinks he has also created a real attack method that uses the default username and password in the engine. Oracle database.

Aaron Newman, senior technology engineer at Application Security Inc., described this new code as something "much more advanced" than the previous code. ' However, it still lacks practical applicability to spread widely even though they themselves are capable .'

Kornbrust recommends that database administrators need to be cautious about the risk of attacks based on security vulnerabilities on workstations plus dangerous code exploiting Oracle's security flaws. ' A successful attack can target database applications through a Windows vulnerability, gaining system access to using Oracle worms to cause serious damage. '

5 ★ | 2 Vote

May be interested

  • The standard of spyware is adoptedPhoto of The standard of spyware is adopted
    a coalition of software companies has agreed to a common measure in identifying and destroying spyware ('uninvited' programs) that specialize in monitoring web browsing and making it difficult.
  • Tried to define 'rootkit'Photo of Tried to define 'rootkit'
    after being severely criticized for the rootkit scandal inside norton systemworks, symantec urgently called on the entire security industry to soon build a standard concept to define what 'rootkits' are.
  • Symantec updated a series of antivirus softwarePhoto of Symantec updated a series of antivirus software
    from today (january 18), symantec will begin releasing updated versions for its range of familiar security applications, through its automatic liveupdate feature. previously, users could only update b
  • Deep new computer: unexpectedly simple?Photo of Deep new computer: unexpectedly simple?
    security companies have just warned of a new worm worm spreading strongly on the internet.
  • 20th birthday of the first computer virus!Photo of 20th birthday of the first computer virus!
    the vast majority of computer users today probably do not know that last january 19 is the 20th anniversary of the world's first computer virus.
  • 5 basic steps to eradicate SpywarePhoto of 5 basic steps to eradicate Spyware
    spyware causes pop-up ads, changes system settings, changes links to home pages, search pages, and especially reduces performance and destabilizes the system. spyware is one of these