Oracle Database Server version 9iAS installs with up to 160 distinct default login accounts. The usernames and passwords for these have been made publicly available and could be used by an attacker to gain access to an Oracle server.
Depending on the components chosen at installation time, Oracle Database Server version 9iAS (and possibly other versions) includes in its default configuration as many as 160 accounts with known usernames and passwords. Many of the passwords are the same as the corresponding username, making it even easier for attackers to gain access.
Additionally, some Oracle components include functionality that relies on the existence of the default logins with their default passwords.
Attackers may gain access to the Oracle server through a known default login account.
The CERT/CC is currently unaware of a practical solution to this problem.
Change passwords on Oracle's default login accounts. See the complete list of default logins in Appendix A of David Litchfield's white paper, "Hackproofing Oracle Application Server," located at:
Thanks to David Litchfield for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
|Date First Published:||2002-02-27|
|Date Last Updated:||2002-02-27 00:25 UTC|