Overview
Oracle Transparent Data Encryption master encryption key is stored as plaintext, which could allow an attacker to decrypt and read sensitive information within the database.
Description
Transparent Data Encryption (TDE) According to Oracle, Transparent Data Encryption "allows customers to encrypt sensitive data in columns without having to manage the encryption key ... Oracle eliminates the need for views to decrypt data, because the data is transparently decrypted once a user has passed necessary access-control checks." |
Impact
If an attacker can gain access to SGA memory, that attacker may be able to retrieve the TDE master key. Once the key is obtained, the attacker will be able to decrypt and read sensitive information within the database. |
Solution
Apply patches |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerabilty was reported by Alexander Kornbrust of red-database security.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2006-0270 |
Severity Metric: | 4.78 |
Date Public: | 2005-01-17 |
Date First Published: | 2006-01-19 |
Date Last Updated: | 2006-03-17 15:22 UTC |
Document Revision: | 30 |