The Oracle Listener Control Utility (LSNRCTL) contains a format string vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code or commands or cause a denial of service.
Oracle Transparent Network Substrate (TNS ) Listeners are processes that receive connection requests from clients and return information for the clients to use to make database connections. The Listener Control Utility (LSNRCTL) is used to administer Listeners, and has the ability to establish an Oracle Net connection to remote Listeners. When used to administer a Listener, the Listener Control Utility parses the Listener's configuration file ($ORACLE_HOME/NETWORK/ADMIN/LISTENER.ORA for the default Listener).
The Listener Control Utility contains a format string vulnerability that could be exploited when the utility parses commands that are supplied directly to it or read from a Listener configuration file. By default, unauthenticated users can control Oracle Listeners and modify their configuration files. By inserting crafted entries containing format string specifiers into a Listener configuration file, an attacker could cause the Listener Control Utility to execute arbitrary code or commands or crash the utility, preventing its use by legitimate users. An attacker with sufficient privileges can supply crafted commands containing format string specifiers directly to a vulnerable Listener Control Utility.
An unauthenticated remote attacker could execute arbitrary code or commands or cause a denial of service on a vulnerable system.
The CERT/CC thanks David Litchfield of NGSSoftware for information used in this document.
This document was written by Art Manion.
|Date First Published:||2002-06-04|
|Date Last Updated:||2003-06-02 19:06 UTC|