Skip to Main Content

Oracle Database Discussions

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Oracle TNS Listener Remote Poisoning

unknown-1052419Apr 30 2014 — edited Apr 30 2014

Hi all,

I am scanning using NESSUS the security vulnerabilities of our databases. And it flagged the listener.

What shall I do with the listener? Thanks

69552 (1) - Oracle TNS Listener Remote Poisoning

Synopsis

It is possible to register with a remote Oracle TNS listener.

Description

The remote Oracle TNS listener allows service registration from a remote host. An attacker can exploit this issue to

divert data from a legitimate database server or client to an attacker-specified system.

Successful exploits will allow the attacker to manipulate database instances, potentially facilitating man-in-the-middle,

session- hijacking, or denial of service attacks on a legitimate database server.

See Also

http://www.nessus.org/u?e3d5ec0b

http://www.nessus.org/u?1feaed5b

http://www.nessus.org/u?29d9db9b

Solution

Apply the work-around in Oracle's advisory.

Risk Factor

High

CVSS Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Temporal Score

6.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

BID 53308

CVE CVE-2012-1675

XREF OSVDB:81475

XREF CERT:359816

Exploitable with

Core Impact (true)

Plugin Information:

Publication date: 2013/08/26, Modification date: 2014/04/10

Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on May 28 2014
Added on Apr 30 2014
6 comments
6,818 views