The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."
References
Link | Resource |
---|---|
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012 | Vendor Advisory |
http://seclists.org/fulldisclosure/2012/Apr/204 | Exploit Mailing List Third Party Advisory |
http://www.kb.cert.org/vuls/id/359816 | Third Party Advisory US Government Resource |
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html | Vendor Advisory |
http://www.securityfocus.com/bid/53308 | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2012/Apr/343 | Mailing List Third Party Advisory |
http://www.securitytracker.com/id?1027000 | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html | Mailing List Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303 | VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2012-05-08 15:55
Updated : 2018-08-23 05:51
NVD link : CVE-2012-1675
Mitre link : CVE-2012-1675
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
oracle
- database_server