Oracle TNS Listener Remote Poisoning

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

It was possible to register with a remote Oracle TNS listener.

Description :

The remote Oracle TNS listener allows service registration from a
remote host. An attacker can exploit this issue to divert data from a
legitimate database server or client to an attacker-specified system.

Successful exploits will allow the attacker to manipulate database
instances, potentially facilitating man-in-the-middle, session-
hijacking, or denial of service attacks on a legitimate database

See also :

Solution :

Apply the workaround in Oracle's advisory.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true

Family: Databases

Nessus Plugin ID: 69552 ()

Bugtraq ID: 53308

CVE ID: CVE-2012-1675

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now