what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

oralist.txt

oralist.txt
Posted Aug 16, 2002
Authored by David Litchfield | Site ngssoftware.com

Oracle provide a tool called the Listener Control utility (lsnrctl) to allow an Oracle DBA to remotely control the Listener. The Listener is responsible for dealing with client requests for database services. This control utility contains an indirect remotely exploitable format string vulnerability. By default the Oracle Listener is not protected against unauthenticated access and control. The configuration files of Listeners in such a state can be modified without the user needing to supply a password. By modifying certain entries in the listener.ora file, by inserting a format string exploit, an attacker can gain control of a Listener control utility.

SHA-256 | 670c33c99fb1077f6adc54c6ef7f9e82ca3f1c4fcc69fdf1ecde9e16b02514fa

oralist.txt

Change Mirror Download
NGSSoftware Insight Security Research Advisory

Name: Oracle Listener Control Format Strings
Systems Affected: Oracle 9i, 8i on all platforms
Severity: Medium
Category: Format String Vulnerabilities
Vendor URL: http://www.oracle.com/
Authors: David Litchfield (david@ngssoftware.com)
Advisory URL: http://www.ngssoftware.com/advisories/ora-lsnrfmtstr.txt
Date: 14th August 2002
Advisory number: #NISR14082002
VNA Reference: http://www.nextgenss.com/vna/ora-lsnrctl.txt


Description
***********
Oracle provide a tool called the Listener Control utility (lsnrctl) to allow
an Oracle DBA to remotely control the Listener. The Listener is responsible
for dealing with client requests for database services. This control utility
contains an indirect remotely exploitable format string vulnerability.

Details
*******
By default the Oracle Listener is not protected against unauthenticated
access and control. The configuration files of Listeners in such a state can
be modified without the user needing to supply a password. By modifying
certain entries in the listener.ora file, by inserting a format string
exploit, an attacker can gain control of a Listener control utility.
Typically an attack would require the attacker to modify the file and wait
for an Oracle DBA to use the Listener control utility to access the Listener
at which point control over the utility's path of execution can be gained.
This will give the attacker the ability only to gain control of the DBA's
machine and not the database server. This is a complex attack and requires
certain "events" to happen and as such the risk is quite low. That said,
Oracle users are urged to apply the patch.


Fix Information
***************
NGSSoftware alerted Oracle to this problem on the 13th May 2002. Oracle have
produced a patch and issued an alert. Please see their bulletin for more
details.

http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf

In the intermin NGSSoftware advise that Oracle DBAs ensure that the Listener
can not be controlled remotely and anonymously.

There are several steps one can take to secure the Listener and hence
prevent exploitation of this format string vulnerability.

One can set in the listener.ora

ADMIN_RESTRICTIONS_lsnrname=ON

This will prevent modifications to the Listener config files. Furthe a
password should be set to limit actions a user can take.



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close