lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <OFB41A5051.E28C2E0A-ON85256C4D.00688D3E-88256C4D.006859E7@hq.rapid7.com>
From: advisory at rapid7.com (Rapid 7 Security Advisories)
Subject: R7-0006: Oracle 8i/9i Listener SERVICE_CURLOAD Denial of Service

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________
                     Rapid 7, Inc. Security Advisory

        Visit http://www.rapid7.com/ to download NeXpose(tm), our
         advanced vulnerability scanner. Linux and Windows 2000
                       versions are available now!
_______________________________________________________________________

Rapid 7 Advisory R7-0006
Oracle 8i/9i Listener SERVICE_CURLOAD Denial of Service

   Published:  October 9, 2002
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0006.txt

   Oracle:     Oracle Security Alert #42
   http://otn.oracle.com/deploy/security/pdf/2002alert42rev1.pdf

   CVE:        CAN-2002-1118
   http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1118

   Bugtraq:    5678
   http://online.securityfocus.com/bid/5678

1. Affected system(s):

   KNOWN VULNERABLE:
    o Oracle 9i Release 2 (9.2.x)
    o Oracle 9i Release 1 (9.0.x)
    o Oracle 8i (8.1.x)

   Apparently NOT VULNERABLE:
    o Oracle 8.0.x (but see below)

2. Summary

   The Oracle TNS Listener is susceptible to a denial of service attack
   when issued the SERVICE_CURLOAD command.

3. Vendor status and information

   Oracle, Inc.
   http://www.oracle.com

      Oracle was notified of this vulnerability and has made patches
      available.  This issue is being tracked as bug #2540219 in
      the Oracle bug database.

4. Solution

   Download and apply the vendor-supplied patches.  Please see Oracle
   Security Alert #42 for more information:

         http://otn.oracle.com/deploy/security/pdf/2002alert42rev1.pdf

   Please note that patches for some versions and platforms are not
   yet available.

5. Detailed analysis

   Connecting to the Oracle TNS listener (usually on port 1521) and
   issuing the command "(CONNECT_DATA=(COMMAND=SERVICE_CURLOAD))"
   causes the Oracle server to respond with a message indicating
   successful execution.  However, once the caller closes the
   connection, the listener service stops responding.  The effects
   of this DoS vary depending on how long the attacker keeps the
   original connection open.  If the caller keeps the listener
   connection open while new connections are serviced, the listener
   service will be disabled and may crash with an access violation.
   If the caller closes the listener connection before other requests
   are serviced, the listener service will refuse to accept new
   connections.

   We were unable to reproduce this issue on Oracle 8.0.6.  Version
   8.0.6 of Oracle logs a result of 0 (success) in listener.log.
   However, the response to the caller contains error code 12629260,
   which appears to be a non-standard error code.  This may also be
   the result of an exceptional condition, but we were unable to crash
   or disable the listener in our testing.

6. Contact Information

   Rapid 7 Security Advisories
   Email:   advisory@...id7.com
   Web:     http://www.rapid7.com/
   Phone:   +1 (212) 558-8700

7. Disclaimer and Copyright

   Rapid 7, Inc. is not responsible for the misuse of the information
   provided in our security advisories. These advisories are a service
   to the professional security community.  There are NO WARRANTIES
   with regard to this information. Any application or distribution of
   this information constitutes acceptance AS IS, at the user's own
   risk.  This information is subject to change without notice.

   This advisory Copyright (C) 2002 Rapid 7, Inc.  Permission is
   hereby granted to redistribute this advisory, providing that no
   changes are made and that the copyright notices and disclaimers
   remain intact.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (OpenBSD)

iD8DBQE9pHLTcL76DCfug6wRAn7CAJ4u7Stu8xhHJJ0KdIxzyWomq8s+OwCgpvEJ
xkPC6WztYXEmd1hekDYgLPA=
=n2ee
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ