Oracle TNS Listener Remote Poisoning

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

It is possible to register with a remote Oracle TNS listener.

Description :

The remote Oracle TNS listener allows service registration from a
remote host. An attacker can exploit this issue to divert data from a
legitimate database server or client to an attacker-specified system.

Successful exploits will allow the attacker to manipulate database
instances, potentially facilitating man-in-the-middle, session-
hijacking, or denial of service attacks on a legitimate database
server.

See also :

http://www.nessus.org/u?e3d5ec0b
http://www.nessus.org/u?1feaed5b
http://www.nessus.org/u?29d9db9b

Solution :

Apply the work-around in Oracle's advisory.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Databases

Nessus Plugin ID: 69552 ()

Bugtraq ID: 53308

CVE ID: CVE-2012-1675