Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Oracle database security, SAP security note 926023

Description

On October 31, 2005, a PL/SQL worm program was published in the Internet. This worm program called “Oracle Worm Voyager” is relatively harmless and luckily hardly causes any damage. However, variants of this program have been developed and published since then. Therefore, further developments are to be expected which may possibly cause more harm.

Due to this situation, Oracle and SAP decided to check the current security level of their Oracle database and to evaluate further possible actions to increase the security and to prevent such attacks against the Oracle database.

You can implement most of the actions described in this note quickly and without any problems. They are adjusted to the SAP application and do not affect the functions of the SAP system.

This note is intended to support you in taking the required and correct measures to increase the database security.

Available fix and Supported packages

Affected component

    BC-DB-ORA
    Oracle

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected].

URL

https://launchpad.support.sap.com/#/notes/926023

TAGS

#Oracle-Worm-Voyager
#virus
#Trojan-horse
#hacker
#security-breaches
#database-security

More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.