The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html | mailing list third party advisory vendor advisory |
http://www.securityfocus.com/bid/53308 | exploit vdb entry third party advisory |
http://www.securitytracker.com/id?1027000 | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2012/Apr/343 | third party advisory mailing list |
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012 | vendor advisory |
http://www.kb.cert.org/vuls/id/359816 | third party advisory us government resource |
http://seclists.org/fulldisclosure/2012/Apr/204 | mailing list exploit third party advisory |
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303 | vdb entry |