[<prev] [next>] [day] [month] [year] [list]
Message-Id: <AE507949-CAC9-4AA2-B1EA-6A42AC183C67@red-database-security.com>
Date: Wed, 18 Apr 2007 12:26:23 +0200
From: Alexander Kornbrust <ak@...-database-security.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Advisory: Shutdown unprotected Oracle TNS
Listener via Oracle Discoverer Servlet [AS01]
Name Shutdown unprotected TNS Listener via Oracle Discoverer Servlet
[AS01]
Systems Affected Oracle Discoverer Servlet
Severity Low Risk
Category Remote D.o.S.
Vendor URL http://www.oracle.com/
Author Alexander Kornbrust (ak at red-database-
security.com)
Advisory 17 April 2007 (V 1.00)
Details
#######
The Oracle Discoverer Servlet contains a field for the database/tns
alias. It
is possible to send TNS STOP commands via this field and to shutdown
unprotected Oracle TNS Listener.
This advisory is available at
<http://www.red-database-security.com/advisory/
oracle_discoverer_servlet.html>
Patch Information
##################
Apply the patches for Oracle CPU April 2007.
History
#######
28-oct-2003 Oracle secalert was informed
29-oct-2003 Bug confirmed
17-apr-2007 Oracle published CPU April 2007 [AS01]
17-apr-2007 Advisory published
Additional Information
######################
An analysis of the Oracle CPU April 2007 is available here
<http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html>
This document will be updated during the next few days and weeks with
the
latest information.
(c) 2007 by Red-Database-Security GmbH
--
http://www.red-database-security.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists