Security Implications of Oracle Product Desupport April 23, 2015



Similar documents
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

New Security Features in Oracle E-Business Suite 12.2

How to Audit the Top Ten E-Business Suite Security Risks

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Encrypting Sensitive Data in Oracle E-Business Suite

Oracle Database Security Myths

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

AppDefend Application Firewall Overview

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Securing Oracle E-Business Suite in the Cloud

Integrigy Corporate Overview

Real Life Database Security Mistakes. Stephen Kost Integrigy Corporation Session #715

AppSentry Application and Database Security Auditing

PCI Compliance in Oracle E-Business Suite

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

New Oracle 12c Security Features Oracle E-Business Suite Perspective

<Insert Picture Here> E-Business Suite Technology Stack Certification Roadmap Steven Chan Senior Director, Applications Technology Integration

Guide to Auditing and Logging in the Oracle E-Business Suite

All Things Oracle Database Encryption

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

PCI Compliance in Oracle E-Business Suite

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

Managing Oracle E-Business Suite Security

Detecting and Stopping Cyber Attacks against Oracle Databases

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Web Application Security

Introduction to Cyber Security / Information Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Oracle Enterprise Manager 12c Cloud Control for Managing Oracle E-Business Suite 12.2

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Need for Database Security. Whitepaper

NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid

Goals. Understanding security testing

MySQL Security: Best Practices

Oracle Database 11g: Security. What you will learn:

An Oracle White Paper October Frequently Asked Questions for Oracle Forms 11g

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Internet Banking System Web Application Penetration Test Report

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence

Owner of the content within this article is Written by Marc Grote

Oracle E-Business Suite (EBS)

What is Web Security? Motivation

Implementing Database Security and Auditing

Secret Server Qualys Integration Guide

Oracle Database 11g: Security Release 2

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Oracle EBS Release 12.2 from A to Z. Real Experience of a Technical Upgrade

<Insert Picture Here> Oracle Database Vault

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

D50323GC20 Oracle Database 11g: Security Release 2

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Network Test Labs (NTL) Software Testing Services for igaming

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Upgrade Oracle EBS to Release Presenter: Sandra Vucinic VLAD Group, Inc.

The monsters under the bed are real World Tour

Table of Contents. Introduction. Audience. At Course Completion

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Securing Data in Oracle Database 12c

How to Make Your Oracle APEX Application Secure

Oracle IDM Integration with E-Business Suite & Middleware Technologies

HOW TO MAKE YOUR ORACLE APEX APPLICATION SECURE Peter Lorenzen, WM-data a LogicaCMG company

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Database Security & Auditing

Web Application Report

Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001

The Secure Web Access Solution Includes:

Load Balancing Oracle Web Applications. An Oracle White Paper November 2004

Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)

Oracle Database 11g: Security

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Top 10 Database. Misconfigurations.

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Web Application Security Assessment and Vulnerability Mitigation Tests

Release 12 Apps DBA 101. John Stouffer Independent Consultant

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Blackboard Learn TM, Release 9 Technology Architecture. John Fontaine

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

How to Grow and Transform your Security Program into the Cloud

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

JVA-122. Secure Java Web Development

Oracle Security Auditing

Oracle Security Auditing

Oracle E-Business Suite (R12) Integration with OID/OAM 11g

Data Breaches and Web Servers: The Giant Sucking Sound

Guidelines for Web applications protection with dedicated Web Application Firewall

SSL, Load Balancers, Rewrite, Redirect, and More Advanced Configuration

Auditing the Security of an SAP HANA Implementation

OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Agenda. Fusion Middleware Release 12 Fusion Applications

<Insert Picture Here> Oracle Web Cache 11g Overview

Transcription:

Security Implications of Oracle Product Desupport April 23, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation

About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing, Encryption, DMZ You

desupport or de-support

de sup port [dee-suh-pawrt] noun 1. the state of not being supported. 2. a phenomenon that occurs to Oracle customers. verb 1. to end or remove support.

Oracle Product Lifetime Support Model Premier Five years from release Security patches and Critical Patch Updates Extended Sustaining (desupport) Three years additional Security patches and Critical Patch Updates Additional annual fee NO security patches NO Critical Patch Updates Indefinite as long as pay annual maintenance Requires a minimum patch level usually the terminal patchset or set of patches Source: http://www.oracle.com/us/support/lifetime-support/index.html

Oracle Software Error Correction Support Oracle Database Oracle Fusion Middleware Oracle Enterprise Manager MOS Note ID 209768.1 Oracle E-Business Suite MOS Note ID 1195034.1 Oracle Lifetime Support http://www.oracle.com/us/support/ lifetime-support/index.html

Oracle Database Version Support Major Releases Extended Support End Date Patchsets CPU Support End Date Oracle 12c R1 July 2021 12.1.0.2 TBD 12.1.0.1 July 2015 11.2.0.4 January 2018 Oracle 11g R2 January 2018 11.2.0.3 July 2015 11.2.0.2 January 2013 11.2.0.1 July 2011 Oracle 11g R1 August 2015 11.1.0.7 July 2015 Oracle 10g R2 July 2013 10.2.0.5 July 2013 Oracle 10g R1 January 2012 10.1.0.5 January 2012

Oracle E-Business Suite Version Support Version Premier Support End Date Extended Support End Date (1) CPU Support End Date EBS 12.2 September 2018 September 2021 July 2021 EBS 12.1 December 2016 December 2019 October 2019 EBS 12.0 January 2012 January 2015 January 2015 (2) EBS 11.5.10 November 2010 November 2013 October 2015 (3) EBS 11.5.9 June 2008 N/A July 2008 EBS 11.5.8 November 2007 N/A October 2007 EBS 11.5.7 May 2007 N/A April 2007 1. Extended support requires a minimum baseline patch level see MOS Note ID 1195034.1. 2. April 2015 CPU for 12.0 is available for customers with Advanced Support Contracts. 3. 11.5.10 Sustaining support exception through December 2015 provides CPUs.

Security Implications of Desupport 1 No security patches or Critical Patch Updates 2 No security configuration updates 3 No technology stack updates or upgrades 4 No major security documentation updates 5 No research or validation of submitted security bugs

No Security Configuration Updates State of security changes over time - Hacking techniques and tools evolve - HTTP cookie security is a prime example Oracle improves security with tweaks to configuration settings through patches and security patches - Mostly minor and behind the scenes changes, but impact security in a meaningful way - Oracle Database privilege changes - Oracle E-Business Suite web server configuration

No Technology Stack Updates or Upgrades Oracle Database - APEX versions not certified Oracle E-Business Suite - New database versions not certified no security patches for the database - Application server security patches not available - Apache, Forms, Reports, JServ, and SSL versions for 11.5.10 are ancient security improvements as well as patches

Web Listener Web Listener 11i/R12 Architecture Differences Oracle EBS 11.5.10.2 Oracle EBS 12.1.3 Application Server Application Server Apache 1.3.19 JServ JSP BC4J modplsql circa 1999 Removed in R12 Apache 1.3.34 (current is 1.3.42 or 2.2.17) OC4J JSP BC4J UIX Replaces JServ Version Desupported ~2005 Reports Forms Oracle 9iAS 1.0.2.2.2 8.0.6.3 Oracle Home App Server Upgradable Reports Forms Oracle AS 10g 10.1.2/10.1.3

No Security Documentation Updates Oracle Database - Oracle Security Guide not updated Oracle E-Business Suite - Oracle EBS Security Configuration Guide not updated - 11i = MOS Note ID 189367.1 - Last Update September 2011 - Oracle EBS DMZ Configuration not updated - 11i = MOS Note ID 287176.1 - Last Update October 2011

No Security Vulnerability Research Oracle Software Security Assurance stated policy is not to fix security bugs in desupported products - Researched for supported products - Fixed in main code-line first - Backported to support products Security bugs may be found in desupported version and never validated by Oracle - Unclear what Oracle s reaction would be to a major vulnerability in a desupported product

Oracle Database Critical Patch Updates

Jan-05 Apr-05 Jul-05 Oct-05 Jan-06 Apr-06 Jul-06 Oct-06 Jan-07 Apr-07 Jul-07 Oct-07 Jan-08 Apr-08 Jul-08 Oct-08 Jan-09 Apr-09 Jul-09 Oct-09 Jan-10 Apr-10 Jul-10 Oct-10 Jan-11 Apr-11 Jul-11 Oct-11 Jan-12 Apr-12 Jul-12 Oct-12 Jan-13 Apr-13 Jul-13 Cumulative Vulnerabilities per DB Version 250 9.2.0.8 Extended Support Oct 2007 10.1.0.5 Extended Support Apr 2009 10.2.0.4 Extended Support Oct 2011 223 200 150 136 100 9.2.0.8 10.1.0.5 10.2.0.4 50 33 0 Cumulative maximum count of open security vulnerabilities assuming no security patches have been applied since the start of Extended Support

Oracle Database CPU Risks and Threats The risk of Oracle database security vulnerabilities depends if an attacker has a database account or can obtain a database account. Type of User Unauthenticated user Database Account No Description Can connect to database listener if IP address, port, SID is known Low privileged user Yes Only PUBLIC privileges Moderate privileged user Yes Some privileges High privileged user Yes DBA like privileges

11.2.0.2 CPU Risk Mapping Type of User Unauthenticated user No database account Low privileged user Create session system privilege only Moderate privileged user Create table, procedure, index, etc. High privileged user DBA, SYSDBA, local OS access, etc. Number of Security Bugs 9 7 6 7 Notes 1 O5LOGON Authentication 7 Denial of service Averages one per CPU Requires only PUBLIC privileges Usually requires CREATE PROCEDURE system privilege 2 SYSDBA privileges 3 Advanced privileges 2 Local OS access

Solutions by Risk for No CPUs Type of User Solutions if CPUs not applied Unauthenticated user No database account Low privileged user Create session system privilege only Moderate privileged user Create table, procedure, index, etc. High privileged user DBA, SYSDBA, local OS access, etc. #1 Limit direct access to the database #2 Check for default passwords #3 Use only named accounts #4 No generic read-only accounts #5 Limit privileges in production #6 Use database vault #7 External database auditing solution #8 Limit OS access for prod to DBAs

Limit Database Access 1. Enterprise firewall and VPN solutions Block all direct database access outside of the data center 2. SQL*Net Valid Node Checking Included with database Block access by IP address 3. Oracle Connection Manager SQL*Net proxy server, included with database Block access by IP address or range 4. Oracle Database Firewall Add-on database security product

Oracle E-Business Suite Critical Patch Updates

Oracle EBS CPU Risks and Threats The risk of Oracle E-Business Suite security vulnerabilities depends if the application is externally accessible and if the attacker has a valid application session. Type of User Application Session Description External/DMZ unauthenticated user No Access external URL External/DMZ authenticated user Yes Any responsibility Internal unauthenticated user No Access internal URL Internal authenticated user Yes Any responsibility

Cumulative Vulnerabilities per 11i Version 120 11.5.9 No Support 11.5.10 RUP 6 Required 11.5.10.2 Minimum Baseline Required 107 100 80 76 60 54 40 20 11.5.9 11.5.10 11.5.10.2 0

11.5.10.2 CPU Risk Mapping Type of User Number of Security Bugs Notes External unauthenticated user 21 (1) 17 of 21 are high risk External authenticated user Internal unauthenticated user 6 (1) 3 of 6 are exploited with only a valid application session 17 Many are high risk Internal authenticated user 10 Most require access to specific module in order to exploit (1) Assumes URL firewall is enabled and count is for all external i modules (isupplier, istore, etc.).

Solutions by Risk for No CPUs Type of User Solutions if CPUs not applied External unauthenticated user External authenticated user Internal unauthenticated user Internal authenticated user #1 Enable Oracle EBS URL firewall #2 Implement Integrigy s AppDefend #3 Enable Oracle EBS external responsibilities #4 Implement Integrigy s AppDefend #5 Limit access to privileged responsibilities

Oracle EBS DMZ MOS Notes Deploying Oracle E-Business Suite in a DMZ requires a specific and detailed configuration of the application and application server. All steps in the Oracle provided MOS Note must be followed. 380490.1 Oracle E-Business Suite R12 Configuration in a DMZ 287176.1 DMZ Configuration with Oracle E-Business Suite 11i MOS = My Oracle Support

URL Firewall Oracle EBS DMZ Configuration Oracle R12 Application Server Client Browser https Apache OC4J Java Server Pages (JSP) 8,000 JSP pages 90 OA Framework (OA/RF.jsp) 11,600 pages 250 3 Core Servlets 30 servlet classes Node Trust Level 2 APPS Database Web Services Servlets 70 servlet classes 1 Oracle Forms 4,000 forms Proper DMZ configuration reduces accessible pages and responsibilities to only those required for external access. Reducing the application surface area eliminates possible exploiting of vulnerabilities in non-external modules.

Integrigy AppDefend for R12 AppDefend is an enterprise application firewall designed and optimized for the Oracle E-Business Suite R12. Prevents Web Attacks Detects and reacts to SQL Injection, XSS, and known Oracle EBS vulnerabilities Limits EBS Modules More flexibility and capabilities than URL firewall to identify EBS modules Application Logging Enhanced application logging for compliance requirements like PCI-DSS 10.2 Protects Web Services Detects and reacts to attacks against native Oracle EBS web services (SOA, SOAP, REST)

Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: www.integrigy.com e-mail: info@integrigy.com blog: integrigy.com/oracle-security-blog youtube: youtube.com/integrigy Copyright 2015 Integrigy Corporation. All rights reserved.