Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Databases >> Oracle tnslsnr version query


Vulnerability Assessment Details

Oracle tnslsnr version query

Vulnerability Assessment Summary
connects and issues a TNS VERSION command

Detailed Explanation for this Vulnerability Assessment

Summary :

The Oracle tnslsnr service is listening on the remote port.

Description :


The remote host is running the Oracle tnslsnr, a network
interface to the remote Oracle database. This product permits
a remote user to acertain the existence and version number
of a given Oracle installation.

In addition, older versions of this service may let a possible hacker
write to arbitrary files on the remote host.

Solution :

Filter incoming traffic to this port so that only authorized
hosts can connect to it.

See also :

http://otn.oracle.com/deploy/security/pdf/listener_alert.pdf

Network Security Threat Level:

None

Networks Security ID: 1853

Vulnerability Assessment Copyright: James W. Abendschan (GPL)

Cables, Connectors

Dell Precision T3600 Xeon E5-2680 8-Core 32GB RAM 512GB SSD FIREPRO V5800 Win 10
$429.0
Dell Precision T3600 Xeon E5-2680 8-Core 32GB RAM 512GB SSD FIREPRO V5800 Win 10 pictureSun T4-2 Oracle SPARC Base Server,2x2.85GHz 8-core CPU, 5q
$1750.0
Sun T4-2 Oracle SPARC Base Server,2x2.85GHz 8-core CPU,  5q pictureSUN 7049061 8-Core 2.85GHz System Board Assembly for T4-2 5q
$1400.0
SUN 7049061 8-Core 2.85GHz System Board Assembly for T4-2 5q pictureSUN 7049060 8-Core 2.85GHz System Board Assembly for T4-2 5q
$1400.0
SUN 7049060 8-Core 2.85GHz System Board Assembly for T4-2 5q picture


Discussions

No Discussions have been posted on this vulnerability.