‘Rootkiting Your Database’
‘The information has been provided by Kornbrust, Alexander.
The original article can be found at: http://www.red-database-security.com/wp/db_rootkits_us.pdf‘
Alexander Kornbrust has found a new class of security vulnerabilities. By doing modifications in the metadata it is possible to create application rootkits (e.g. database rootkits). It is for example possible to create hidden users in an Oracle database. These users are invisible to most of the tools (even Oracle security scanner).’