|
Vulnerability Assessment & Network Security Forums |
||||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Databases >> Oracle tnslsnr version query Vulnerability Assessment Details
|
Oracle tnslsnr version query |
||
connects and issues a TNS VERSION command Detailed Explanation for this Vulnerability Assessment Summary : The Oracle tnslsnr service is listening on the remote port. Description : The remote host is running the Oracle tnslsnr, a network interface to the remote Oracle database. This product permits a remote user to acertain the existence and version number of a given Oracle installation. In addition, older versions of this service may let a possible hacker write to arbitrary files on the remote host. Solution : Filter incoming traffic to this port so that only authorized hosts can connect to it. See also : http://otn.oracle.com/deploy/security/pdf/listener_alert.pdf Network Security Threat Level: None Networks Security ID: 1853 Vulnerability Assessment Copyright: James W. Abendschan |
||
Cables, Connectors |
![]() |
|
||
No Discussions have been posted on this vulnerability. |