CVE-2012-1675

Scores

EPSS

0.914High91.4%
0%20%40%60%80%100%

Percentile: 91.4%

CVSS

7.5High2.0
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka “TNS Poison.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-264

Exploits

Exploit ID: CVE-2012-1675

Source: github-poc

URL: https://github.com/bongbongco/CVE-2012-1675

Recommendations

Source: nvd

We are currently unaware of a practical solution to this problem. Please consider the following workarounds provided by Oracle.Using Class of Secure Transport (COST) to Restrict Instance Registration”To demonstrate how the COST parameter “SECURE_REGISTER_listener_name = (IPC)” is used to restrict instance registration with database listeners. With this COST restriction in place only local instances will be allowed to register. These instructions can be used to address the issues published in Oracle Security Alert CVE-2012-1675 by using COST to restrict connections to only local instances.“Using Class of Secure Transport (COST) to Restrict Instance Registration in Oracle RAC”To demonstrate how the COST parameter “SECURE_REGISTER_listener_name = ” is used to restrict instance registration with local node and SCAN listeners in an 11.2. RAC environment. With COST restrictions in place only local and  authorized instances having appropriate credentials will be allowed to register. These instructions can be used to address the issues published in Oracle Security Alert CVE-2012-1675 by using COST to restrict connections to only those instances having appropriate credentials.“Additional information may be found at the links above.

URL: http://www.kb.cert.org/vuls/id/359816

Vulnerable Software (1)

Type: Configuration

Vendor: oracle

Product: database_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:database_server:10.2.0.4...

Source: nvd