New worm variant exploits Oracle errors
The malicious code has the ability to exploit security vulnerabilities and cause serious damage to previously distributed Oracle database software that has been widely modified and redistributed on the Internet, ringing a scene ring. New report about a new attack.
Thus, just two months after an unnamed researcher first published an example of an attack computer worm exploiting a security vulnerability in Oracle database software, this malicious code was researched and improved to redistribute through the list of Full Disclosure email. Again a new technique to attack this database system.
However, Alexander Kornbrust, executive director of database security firm GmbH, said: 'These kinds of attacks are still theoretical and I don't think that the applications The database may be threatened because of risks like this. If you are managing a large company with hundreds of valuable databases, this code is really a destroyer. This malicious code is likely to be used to develop into a complete worm. Being careful is probably the best thing to do '
Kornbrust - an expert well known for Oracle's security research products - thinks he has also created a real attack method that uses the default username and password in the engine. Oracle database.
Aaron Newman, senior technology engineer at Application Security Inc., described this new code as something "much more advanced" than the previous code. ' However, it still lacks practical applicability to spread widely even though they themselves are capable .'
Kornbrust recommends that database administrators need to be cautious about the risk of attacks based on security vulnerabilities on workstations plus dangerous code exploiting Oracle's security flaws. ' A successful attack can target database applications through a Windows vulnerability, gaining system access to using Oracle worms to cause serious damage. '
You should read it
- Oracle launched an autonomous database exclusively for business customers
- How to Study Oracle
- How to Become an Oracle Consultant
- How to Use R Language to Connect with an ORACLE Database
- Oracle announced Exadata version 2
- Compare the performance of MongoDB and SQL Server 2008
- Database management with TOAD
- What is Oracle VirtualBox? What can be done with it?
May be interested
- The standard of spyware is adopteda coalition of software companies has agreed to a common measure in identifying and destroying spyware ('uninvited' programs) that specialize in monitoring web browsing and making it difficult.
- Tried to define 'rootkit'after being severely criticized for the rootkit scandal inside norton systemworks, symantec urgently called on the entire security industry to soon build a standard concept to define what 'rootkits' are.
- Symantec updated a series of antivirus softwarefrom today (january 18), symantec will begin releasing updated versions for its range of familiar security applications, through its automatic liveupdate feature. previously, users could only update b
- Deep new computer: unexpectedly simple?security companies have just warned of a new worm worm spreading strongly on the internet.
- 20th birthday of the first computer virus!the vast majority of computer users today probably do not know that last january 19 is the 20th anniversary of the world's first computer virus.
- 5 basic steps to eradicate Spywarespyware causes pop-up ads, changes system settings, changes links to home pages, search pages, and especially reduces performance and destabilizes the system. spyware is one of these