CVE-2012-1675
The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."
Published
2012-05-08T22:55:01.010
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html
Mailing List, Third Party Advisory
([email protected])
-
http://seclists.org/fulldisclosure/2012/Apr/204
Exploit, Mailing List, Third Party Advisory
([email protected])
-
http://seclists.org/fulldisclosure/2012/Apr/343
Mailing List, Third Party Advisory
([email protected])
-
http://www.kb.cert.org/vuls/id/359816
Third Party Advisory, US Government Resource
([email protected])
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Third Party Advisory
([email protected])
-
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html
Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/53308
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1027000
Third Party Advisory, VDB Entry
([email protected])
-
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012
Vendor Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303
VDB Entry
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2012/Apr/204
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2012/Apr/343
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/359816
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/53308
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1027000
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303
VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)