exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

oralist.txt

oralist.txt
Posted Aug 16, 2002
Authored by David Litchfield | Site ngssoftware.com

Oracle provide a tool called the Listener Control utility (lsnrctl) to allow an Oracle DBA to remotely control the Listener. The Listener is responsible for dealing with client requests for database services. This control utility contains an indirect remotely exploitable format string vulnerability. By default the Oracle Listener is not protected against unauthenticated access and control. The configuration files of Listeners in such a state can be modified without the user needing to supply a password. By modifying certain entries in the listener.ora file, by inserting a format string exploit, an attacker can gain control of a Listener control utility.

SHA-256 | 670c33c99fb1077f6adc54c6ef7f9e82ca3f1c4fcc69fdf1ecde9e16b02514fa

oralist.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Oracle Listener Control Format Strings
Systems Affected: Oracle 9i, 8i on all platforms
Severity: Medium
Category: Format String Vulnerabilities
Vendor URL: http://www.oracle.com/
Authors: David Litchfield (david@ngssoftware.com)
Advisory URL: http://www.ngssoftware.com/advisories/ora-lsnrfmtstr.txt
Date: 14th August 2002
Advisory number: #NISR14082002
VNA Reference: http://www.nextgenss.com/vna/ora-lsnrctl.txt


Description
***********
Oracle provide a tool called the Listener Control utility (lsnrctl) to allow
an Oracle DBA to remotely control the Listener. The Listener is responsible
for dealing with client requests for database services. This control utility
contains an indirect remotely exploitable format string vulnerability.

Details
*******
By default the Oracle Listener is not protected against unauthenticated
access and control. The configuration files of Listeners in such a state can
be modified without the user needing to supply a password. By modifying
certain entries in the listener.ora file, by inserting a format string
exploit, an attacker can gain control of a Listener control utility.
Typically an attack would require the attacker to modify the file and wait
for an Oracle DBA to use the Listener control utility to access the Listener
at which point control over the utility's path of execution can be gained.
This will give the attacker the ability only to gain control of the DBA's
machine and not the database server. This is a complex attack and requires
certain "events" to happen and as such the risk is quite low. That said,
Oracle users are urged to apply the patch.


Fix Information
***************
NGSSoftware alerted Oracle to this problem on the 13th May 2002. Oracle have
produced a patch and issued an alert. Please see their bulletin for more
details.

http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf

In the intermin NGSSoftware advise that Oracle DBAs ensure that the Listener
can not be controlled remotely and anonymously.

There are several steps one can take to secure the Listener and hence
prevent exploitation of this format string vulnerability.

One can set in the listener.ora

ADMIN_RESTRICTIONS_lsnrname=ON

This will prevent modifications to the Listener config files. Furthe a
password should be set to limit actions a user can take.



Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close