• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – GhostDNS campaign: Trusted binaries abused, DLL Hijacking and Code Injection
October 22, 2018
A Cybersecurity Fiasco: Chinese Spies Plant a Microchip to Tamper US Tech-Giants’ Server
October 24, 2018

Rewterz Threat Advisory – CVE-2018-3253 – Oracle ‘Virtual Directory Manager’ Vulnerability

October 23, 2018

Oracle Virtual Directory is vulnerable to information disclosure, data manipulation or Denial of Service attack, and can be exploited by a malicious user with low privileges.

 

 

IMPACT:  NORMAL

 

 

PUBLISH DATE:  23-10-2018

 

 

OVERVIEW

 

 

A vulnerability was found in Oracle Virtual Directory, which if exploited by malicious users may lead to disclosure of sensitive information, manipulation of data, or may cause a DoS (Denial of Service). Oracle has released updates for patching the vulnerability.

 

 

ANALYSIS

 

 

The Vulnerability lies in the Oracle Virtual Directory component of Oracle Fusion Middleware (subcomponent: Virtual Directory Manager). A successful exploit can lead to disclosure of sensitive information or data manipulation like unauthorized updates, manipulation of access privileges to the oracle virtual directory, unauthorized read access or partial denial of service of the Oracle Virtual Directory.

 

 

The vulnerability has been reported in two of the supported versions of Oracle virtual directory, that are 11.1.1.7.0 and 11.1.1.9.0.

 

 

The Active directory password hash was found to be stored on the oracle virtual directory which was readable for all authenticated users and computer objects by default, including the ones with low privileges. Researchers were able to exploit it to crack passwords.

 

 

The vulnerability can be exploited by a malicious user with network access via HTTP to compromise the directory. In short, an attack on the Oracle Virtual Directory may impact the confidentiality, Integrity and Availability of the organization using a vulnerable version of the directory.

 

 

AFFECTED PRODUCTS

 

 

Oracle Virtual Directory 11.x

 

The vulnerability is reported in versions 11.1.1.7.0 and 11.1.1.9.0.

 

 

UPDATES

 

 

Oracle has recently released updates to patch this vulnerability. Apply the available updates to ensure proper and timely precautionary measures. Follow the link for help:

 

https://support.oracle.com/rs?type=doc&id=2433477.1

(users may need to log-in to access the contents of the URL)

 

 

If you think you’re a victim of a cyber-attack, immediately send an email to soc@rewterz.com.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.