Oracle TNS Listener Arbitrary Library Call Execution Vulnerability
Results 1 to 2 of 2

Thread: Oracle TNS Listener Arbitrary Library Call Execution Vulnerability

  1. #1
    Fastest Thing Alive s0nIc's Avatar
    Join Date
    Sep 2001
    Location
    Sydney
    Posts
    1,584

    Cool Oracle TNS Listener Arbitrary Library Call Execution Vulnerability

    Oracle allows PL/SQL code to execute arbitrary library calls through a request to the Oracle Listener process. As there is no authentication, any party able to connect to the Listener may emulate this conversation and cause arbitrary library calls to be executed as the oracle user, including system and exec. It is also possible to redirect standard IO to a socket. This may immediately lead to a local compromise of the Oracle user.


    On Windows based systems, the call is run within the local SYSTEM security context. On Unix systems, the Listener may run with user-level privileges.

    Exploit: There is no exploit code.

    Remote: Yes

  2. #2
    Senior Member
    Join Date
    Dec 2001
    Posts
    1,193

    Thumbs up

    SOnIc how are you getting all this stuff on Oracle? <chuckles> Is there a favorite site or something? Anyway keep up the info on it.
    Trappedagainbyperfectlogic.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides