[ 2021-02-13 ]
Usando el "Last Login Time" para mejorar la seguridad de la base de datos
[ 2021-02-06 ]
Diferencia entre "Session User" y "Current User"
[ 2021-01-19 ]
Oracle 21c: Common Mandatory Profiles
Oracle Database 21c incorpora la posibilidad de forzar restricciones en cuanto a la longitud y composición de las contraseña en las PDBs. Esto se puede realizar, creando un perfil mandatorio (“mandatory profile”) en el CDB raíz y aplicándolo luego a una, varias o todas las PDBs.
Para crearlo se utiliza la sentencia:
SQL> create mandatory profile ...
Este perfil agrega una verificación de longitud mínima de
contraseña a los perfiles locales que están asociados con los usuarios de las
PDBs por medio de una función de validación.
Definido en el contenedor raíz (CDB $ ROOT), actúa como un perfil de usuario que está
permanentemente activo. Los límites definidos en este, se aplican de manera
adicional a los límites existentes del perfil que tenga asignado el usuario. Esto
crea un efecto de unión ya que la función de verificación de complejidad de la
contraseña del perfil mandatorio se ejecutará antes que la propia función (si es
que la hubiera) del perfil asignado a la cuenta de usuario.
Esto quiere decir que la longitud de la contraseña definida
en el perfil mandatorio tendrá prioridad sobre cualquier longitud de contraseña
definida en otro perfil asociado al usuario.
Al poder ser creado o modificado solamente desde el CDB $ ROOT, un administrador de PDB no puede eliminar el requisito de complejidad de contraseña impuesto por el perfil mandatorio facilitando de esta manera que los usuarios puedan establecer contraseñas más cortas e inseguras.
[ 2020-12-24 ]
Perfiles para STIG y CIS en Oracle 21c
[ 2020-12-19 ]
Oracle 21c: Novedades en la seguridad de la base de datos
Finalmente, Oracle Database 20c fué sólo un versión de "preview" y no va a existir oficialmente como release (de hecho ya no está disponible para prueba en el cloud de Oracle).
Por otro lado, los primeros dias de diciembre fue disponibilizada en Always Free Autonomous Database (solamente en las siguientes regiones: IAD, PHX, LHR, FRA) y Database Cloud Service (RAC y single-instance sobre VM; single-instance en "Bare Metal") la nueva versión Oracle Database 21c y su correspondiente documentación.
Se debe tener en cuenta que 21c es un "Innovation Release", con lo cual sólo estará soportada 2 años y medio a partir de su liberación, y no tendrá disponible soporte extendido.
En este artículo, mi colega Lisandro Fernigrini explica detalladamente las diferencias entre las versiones "Innovation Release" y "Long Term Support Release" para quien quiera comprender mejor estos conceptos.
En el post "What's new in Oracle Database 20c Security?" de febrero de este año, enumeraba algunas de las nuevas funcionalidades y cambios de comportamiento relacionados con seguridad, del (en ese momento) nuevo release 20c.
Que sucederá con ellas entonces?
Pues, al haber sido 20c una versión de prueba, todas estas funcionalidades siguen presentes también en el nuevo release 21c.
A continuación, un breve resumen de las novedades más destacadas relacionadas con funcionalidades de seguridad para la nueva versión.
[ 2020-02-14 ]
What's new in Oracle Database 20c Security?
Behavior Changes, Deprecated and Desupported Features:
- Deprecation of Traditional Auditing
- Deprecation of Older Algorithms in DBMS_CRYPTO
- Deprecation of Enterprise User Security (EUS) User Migration Utility
- Deprecation of TLS 1.0 (Transport Layer Security
- Desupport of DBMS_OBFUSCATION_TOOLKIT Package
- Desupport of DBMS_CRYPTO_TOOLKIT_TYPES and DBMS_CRYPTO_TOOLKIT
- Desupport of Oracle ACFS Security (Vault) and ACFS Auditing
- Desupport of ACFS Encryption on Solaris and Windows
[ 2020-01-23 ]
Ya está disponible Oracle Key Vault 18.2
[ 2020-01-15 ]
Oracle CPU de Enero 2020 (Critical Patch Update)
El estándar CVSS v3 considera que las vulnerabilidades con un puntaje base de CVSS entre 9.0 y 10.0 tienen una calificación cualitativa de "Crítica". Las vulnerabilidades con un puntaje base de CVSS entre 7.0 y 8.9 tienen una calificación cualitativa de "Alta". Al igual que con el CPU anterior, la cantidad de CVEs que no son propias de Oracle, representan una cantidad significativa de expuestos críticos y de alta gravedad: 27 de las 117 CVE que no son propias de productos Oracle, son por vulnerabilidades altas y críticas. Lo cual resulta significativo.
[ 2018-01-16 ]
Oracle Critical Patch Update Advisory - January 2018
If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support.
The Critical Patch Update Advisory is the starting point for relevant information.
It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied.
Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information.
Critical Patch Update Advisories are available at the following location:
[ 2017-10-19 ]
Oracle Critical Patch Update Advisory - October 2017

The Critical Patch Update for October 2017 was released on October 17th, 2017.
Oracle strongly recommends applying the patches as soon as possible.
If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support.
The Critical Patch Update Advisory is the starting point for relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied.
Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information. Critical Patch Update Advisories are available at the following location:
[ 2017-08-12 ]
Modificando el período de retención de archivos de auditoria en DBCS
Este script corre semanalmente como un crontab y por defecto elimina los archivos de auditoria (*.aud) que tienen una antiguedad mayor a 14 dias, según podemos verlo en la definición de la documentación correspondiente:
Managing the Log and Diagnostic Files on Database Cloud Service
Tal vez esta cantidad de días nos pueda resultar poca, o tal vez muy elevada.
Vamos a ver como podemos cambiar el período de retencíon de archivos de auditoría.
Como primer paso nos paramos en el directorio cleandb, aqui es donde encontramos el script de depuración y el archivo de configuración:
[oracle@server01 cleandb]$ cd /var/opt/oracle/cleandb
[oracle@server01 cleandb]$ ls -lrt
total 24
-r-xr-xr-x 1 oracle oinstall 19174 Jun 9 22:59 cleandblogs.pl
-r-xr-xr-x 1 oracle oinstall 237 Jun 9 22:59 cleandblogs.cfg
[oracle@server01 cleandb]$ cat cleandblogs.pl |grep -i aud
"AuditRetentionDB" => 1,
"select 'adumpDest:'||value from v\$parameter where name = 'audit_file_dest'"];
$log->logprt("Processing audit logs...\n");
PurgeLogFiles("$results{'adumpDest'}/*.aud",$CleanLogs->{AuditRetentionDB});
PurgeLogFiles("$ORACLE_HOME/rdbms/audit/*.aud",$CleanLogs->{AuditRetentionDB});
[ 2017-07-20 ]
Lock automático de cuentas con INACTIVE_ACCOUNT_TIME
1- Por default está seteado en UNLIMITED
2- La configuración mínima es de 15 dias y la máxima de 24855
col RESOURCE_NAME for a43
col limit for a23
set lines 299
SQL> select RESOURCE_NAME,limit from dba_profiles where profile='DEFAULT';
RESOURCE_NAME LIMIT
------------------------------------------- -----------------------
COMPOSITE_LIMIT UNLIMITED
SESSIONS_PER_USER UNLIMITED
CPU_PER_SESSION UNLIMITED
CPU_PER_CALL UNLIMITED
LOGICAL_READS_PER_SESSION UNLIMITED
LOGICAL_READS_PER_CALL UNLIMITED
IDLE_TIME UNLIMITED
CONNECT_TIME UNLIMITED
PRIVATE_SGA UNLIMITED
FAILED_LOGIN_ATTEMPTS 10
PASSWORD_LIFE_TIME 180
PASSWORD_REUSE_TIME UNLIMITED
PASSWORD_REUSE_MAX UNLIMITED
PASSWORD_VERIFY_FUNCTION NULL
PASSWORD_LOCK_TIME 1
PASSWORD_GRACE_TIME 7
INACTIVE_ACCOUNT_TIME UNLIMITED ----------- > This is the resource_name introduced in oracle 12.2.
17 rows selected.
col RESOURCE_NAME for a43
col limit for a23
set lines 299
SQL> select RESOURCE_NAME,limit from dba_profiles where profile='DEFAULT';
RESOURCE_NAME LIMIT
------------------------------------------- -----------------------
COMPOSITE_LIMIT UNLIMITED
SESSIONS_PER_USER UNLIMITED
CPU_PER_SESSION UNLIMITED
CPU_PER_CALL UNLIMITED
LOGICAL_READS_PER_SESSION UNLIMITED
LOGICAL_READS_PER_CALL UNLIMITED
IDLE_TIME UNLIMITED
CONNECT_TIME UNLIMITED
PRIVATE_SGA UNLIMITED
FAILED_LOGIN_ATTEMPTS 10
PASSWORD_LIFE_TIME 180
PASSWORD_REUSE_TIME UNLIMITED
PASSWORD_REUSE_MAX UNLIMITED
PASSWORD_VERIFY_FUNCTION NULL
PASSWORD_LOCK_TIME 1
PASSWORD_GRACE_TIME 7
INACTIVE_ACCOUNT_TIME UNLIMITED ----------- > This is the resource_name introduced in oracle 12.2.
17 rows selected.
[ 2017-07-19 ]
Oracle Critical Patch Update - July 2017
Oracle Critical Patch Update for July 2017
The Critical Patch Update for July 2017 was released on July 18th, 2017.
Oracle strongly recommends applying the patches as soon as possible.
If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support.
The Critical Patch Update Advisory is the starting point for relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied.
Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information.
[ 2017-06-20 ]
Oracle Security Alert for CVE-2017-3629
Critical Patch Updates
[ 2017-06-02 ]
How to write SQL injection proof PL/SQL (White Paper)
Oracle White Paper
How to write SQL injection proof PL/SQL
ABSTRACT
An internet search for “SQL injection” gets about 4 million hits. The topic excites interest and superstitious fear. This whitepaper dymystifies the topic and explains a straightforward approach to writing database PL/SQL programs that provably guarantees their immunity to SQL injection. Only when a PL/SQL subprogram executes SQL that it creates at run time is there a risk of SQL injection; and you’ll see that it’s easier than you might think to freeze the SQL at PL/SQL compile time. Then you’ll understand that you need the rules which prevent the risk only for the rare scenarios that do require run-time-created SQL. It turns out that these rules are simple to state and easy to follow.
http://www.oracle.com/technetwork/database/features/plsql/overview/how-to-write-injection-proof-plsql-1-129572.pdf
[ 2017-05-24 ]
Parámetros de seguridad obsoletos en 12cR2
Se trata de:
- O7_DICTIONARY_ACCESSIBILITY
- UTL_FILE_DIR
[ 2017-05-21 ]
Usando "dbaascli database changepassword" para cambiar un password en la nube
Para realizar esta tarea debemos ejecutar el comando con el usuario "oracle".
$ dbaascli database changepassword
Introducimos el nombre de usuario y la nueva contraseña cuando se nos solicite.
[ 2017-04-21 ]
Oracle Critical Patch Update - April 2017
Oracle Critical Patch Update for April 2017
The Critical Patch Update for April 2017 was released on April 18th, 2017. Oracle strongly recommends applying the patches as soon as possible.
If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support.
The Critical Patch Update Advisory is the starting point for relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied.
Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information.
Critical Patch Update Advisories are available at the following location:
[ 2017-01-19 ]
Oracle Critical Patch Update - January 2017
January 17, 2017 Oracle Critical Patch Update for January 2017 The Critical Patch Update for January 2017 was released on January 17th, 2017. Oracle strongly recommends applying the patches as soon as possible. If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support. The Critical Patch Update Advisory is the starting point for relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied. Also, it is essential to review the Critical Patch Update supporting documentation referenced in the Advisory before applying patches, as this is where you can find important pertinent information. Critical Patch Update Advisories are available at the following location: |
[ 2016-10-21 ]
Oracle Critical Patch Update Advisory – October 2016
Los fallos se dan en varios componentes de múltiples productos y como es habitual la lista de productos afectados es extensa.
A continuación ofrecemos una relación de productos y el número de vulnerabilidades corregidas:
Nueve nuevas vulnerabilidades corregidas en Oracle Database Server (una de ellas explotable remotamente sin autenticación), 2 vulnerabilidades en Oracle Secure Backup (ambas explotables remotamente sin autenticación) y una nueva vulnerabilidad corregida en Oracle Big Data Graph. Afectan a los componentes: OJVM, Kernel PDB, Application Express, RDBMS Programmable Interface, RDBMS Security y RDBMS Security and SQL*Plus.