O19C-00-013400 - Access to external executables must be disabled or restricted.

Information

The Oracle external procedure capability provides use of the Oracle process account outside the operation of the database management system (DBMS) process. It can be used to submit and execute applications stored externally from the database under operating system controls. The external procedure process is the subject of frequent and successful attacks as it allows unauthenticated use of the Oracle process account on the operating system. As of Oracle version 11.1, the external procedure agent may be run directly from the database and not require use of the Oracle listener. This reduces the risk of unauthorized access to the procedure from outside of the database process.

Solution

If use of the external procedure agent is required, then authorize and document the requirement in the system documentation.

If the external procedure agent must be accessible to the Oracle listener, then specify this and authorize it in the system documentation.

If use of the Oracle External Procedure agent is not required:

1. Stop the Oracle Listener process.
2. Remove all references to extproc in the listener.ora and tnsnames.ora files.
3. Alter the permissions on the executable files:
Unix: Remove read/write/execute permissions from owner, group, and world.
Windows: Remove Groups/Users from the executable (except groups SYSTEM and ADMINISTRATORS) and allow READ [only] for SYSTEM and ADMINISTRATORS groups.

If required:

1. Restrict extproc execution to only authorized applications.
2. Specify EXTPROC_DLLS=ONLY: [list of authorized DLLS] in the extproc.ora and the listener.ora files.
3. Create a separate, dedicated listener for use by the external procedure agent.

Refer to the Oracle Net Services Administrators Guides, External Procedures section for detailed configuration information.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_19c_V1R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7a., CAT|II, CCI|CCI-000381, Rule-ID|SV-270557r1065281_rule, STIG-ID|O19C-00-013400, Vuln-ID|V-270557

Plugin: Unix

Control ID: cef2c222757cebc2711a24f1a0a9e2d704ca80c678d5c0a30423ee3a78a85dab