Database administrators now have a little added incentive to installOracle Corp.’s latest security patches, released earlier this week.Malicious software is now circulating that can crash an unpatcheddatabase server, and one security expert predicted that more malwaretargeting the 89 recently patched vulnerabilities is on the way.On Thursday, code was published on the Full Disclosure security mailinglist that exploits a buffer overflow vulnerability in certain versionsof Oracle’s databases.This code could be used by attackers to bring down a database, using atechnique called an SQL injection attack, said Alexander Kornbrust, abusiness director at Red-Database-Security GmbH, in Neunkirchen,Germany. In SQL injection attacks, Web applications that work with thedatabase are tricked into sending malicious database queries using theSQL language.The exploit could be used either by an attacker who had usercredentials on an unpatched database or by a remote attacker, using anSQL injection attack over the Internet, Kornbrust said. “I tried theexploit and it’s working,” he said in an interview conducted viainstant message. “I highly recommend customers to apply these patchesas soon as possible.” In a statement, Oracle said that versions 9i and 10g of the databasesoftware were vulnerable to the bug, but the exploit published on FullDisclosure affects only 10g users, according to Kornbrust.On Tuesday, Oracle released a bundle of critical security patches thatfixed 89 bugs in its database and application servers, as well as somePeopleSoft and J.D. Edwards applications. Oracle releases securitypatches every three months as part of its security update program. Normally, a few exploits begin circulating after each Oracle security update, Kornbrust said.The buffer overflow vulnerability is described as vulnerability numberDB27 on this page:http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html#Appendix%20AThe Full Disclosure exploit code can be found here: http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038061.htmlOracle did not respond to requests for comment on this story.By Robert McMillan – IDG News Service (San Francisco Bureau) Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe