Call: +44 (0)7759 277220 Call
Blog

Pete Finnigan's Oracle Security Weblog

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

[Previous entry: "Oracle aims to tone security muscle with Fusion"] [Next entry: "Oracle have released a FAQ to counter the mod_plsql 0-day bug"]

A great snort rule to detect the mod_plsql 0-day bug



I was emailed on Thursday evening by Richard Quintin who wrote to tell me that he had read my post about the DB18 exploit code being made available. He said that he had written a snort rule that will catch the bug being exploited as he figured if it is that easy to exploit the bad guys will be at it.

Anyhow Alex Kirk responded with a more efficient rule and Richard thought i might like to post it here for the benefit of all of those who read this blog and who want to protect their databases from this issue. All credit goes to Alex Kirk. Here is the rule:


alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"ORACLE
AUTH_ALTER_SESSION exploit attempt"; flow:to_server,established;
content:"AUTH_ALTER_SESSION"; nocase;
pcre:"/AUTH_ALTER_SESSION(?!.{1,10}ALTER\s+SESSION\s+SET)/smi";
reference:http://www.imperva.com/application_defense_center/papers/oracle-dbms-01172006.html;
classtype:attempted-admin; )
tag:session,5,packets; )