Red Hat Bugzilla – Bug 859935
CVE-2012-3137 oracle-server: Authentication protocol allows session key and salt for arbitrary users ("stealth password cracking vulnerability")
Last modified: 2018-03-01 15:38:23 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-3137 to the following vulnerability: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability." References: [1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3137 [2] http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html [3] http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular [4] http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/
Other references: [5] http://www.ekoparty.org/eng/2012/esteban-fayo.php
Statement: Not vulnerable. This issue did not affect the version of the oracle-server package as shipped with Red Hat Network Satellite 5.4.