Vulnerability Note VU#712723

Oracle 9iAS default configuration uses well-known default passwords

Original Release date: 26 Feb 2002 | Last revised: 26 Feb 2002

Overview

Oracle Database Server version 9iAS installs with up to 160 distinct default login accounts. The usernames and passwords for these have been made publicly available and could be used by an attacker to gain access to an Oracle server.

Description

Depending on the components chosen at installation time, Oracle Database Server version 9iAS (and possibly other versions) includes in its default configuration as many as 160 accounts with known usernames and passwords. Many of the passwords are the same as the corresponding username, making it even easier for attackers to gain access.

Additionally, some Oracle components include functionality that relies on the existence of the default logins with their default passwords.

Impact

Attackers may gain access to the Oracle server through a known default login account.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Change passwords on Oracle's default login accounts. See the complete list of default logins in Appendix A of David Litchfield's white paper, "Hackproofing Oracle Application Server," located at:

http://www.nextgenss.com/papers/hpoas.pdf

Be sure to consult Oracle documentation to learn whether changing passwords may disrupt Oracle functionality in your environment.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
OracleAffected07 Feb 200226 Feb 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to David Litchfield for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: Unknown
  • Date Public: 10 Jan 2002
  • Date First Published: 26 Feb 2002
  • Date Last Updated: 26 Feb 2002
  • Severity Metric: 11.25
  • Document Revision: 8

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.