Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Databases >> Oracle tnslsnr version query


Vulnerability Assessment Details

Oracle tnslsnr version query

Vulnerability Assessment Summary
connects and issues a TNS VERSION command

Detailed Explanation for this Vulnerability Assessment

Summary :

The Oracle tnslsnr service is listening on the remote port.

Description :


The remote host is running the Oracle tnslsnr, a network
interface to the remote Oracle database. This product permits
a remote user to acertain the existence and version number
of a given Oracle installation.

In addition, older versions of this service may let a possible hacker
write to arbitrary files on the remote host.

Solution :

Filter incoming traffic to this port so that only authorized
hosts can connect to it.

See also :

http://otn.oracle.com/deploy/security/pdf/listener_alert.pdf

Network Security Threat Level:

None

Networks Security ID: 1853

Vulnerability Assessment Copyright: James W. Abendschan (GPL)

Cables, Connectors

Supermicro X8DTT-F System Board - 2x LGA 1366 / Socket B 2 X MEM -
$99.99
Supermicro X8DTT-F System Board - 2x LGA 1366 / Socket B 2 X MEM -   pictureWinFast AMD Sempron LE-1250 2.2Ghz 2GB RAM eMachines T3646 COMPLETE Motherboard
$49.0
WinFast AMD Sempron LE-1250 2.2Ghz 2GB RAM eMachines T3646 COMPLETE Motherboard  pictureGIGABYTE GA-Z270P-D3 (rev. 1.0) ATX Motherboard
$37.0
GIGABYTE GA-Z270P-D3 (rev. 1.0) ATX Motherboard pictureGigabyte Technology GA-870A-UD3 (rev. 2.1), Socket AM3, AMD Motherboard
$53.0
Gigabyte Technology GA-870A-UD3 (rev. 2.1), Socket AM3, AMD Motherboard picture


Discussions

No Discussions have been posted on this vulnerability.