Information
The database is vulnerable to exhaustion of resources that could result in a Denial of Service (DoS) to other clients if not protected from a flood of bad packets submitted by a malicious or errant client connection. The sec_protocol_error_further_action initialization parameter can be set to delay or drop acceptance of bad packets from a client in order to support the continued function of other non-problematic connections.
Solution
Set the value for the sec_protocol_error_further_action initialization parameter to DROP or DELAY.
DROP provides better protection and is recommended.
From SQL*Plus:
alter system set sec_protocol_error_further_action = 'drop' scope = spfile;
OR
alter system set sec_protocol_error_further_action = 'drop,3' scope = spfile;
NOTE: The addition of the ',3' above further limits the number of 'bad packets' to the specified number before forcefully terminating the connection.
The above SQL*Plus command will set the parameter to take effect at next system startup.