Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Oracle TNS Listener Arbitrary Library Call Execution Vulnerability

Oracle TNS Listener Arbitrary Library Call Execution Vulnerability

by Nikola Strahija on February 8th, 2002 Oracle allows PL/SQL code to execute arbitrary library calls through a request to the Oracle Listener process. As there is no authentication, any party able to connect to the Listener may emulate this conversation and cause arbitrary library calls to be executed as the oracle user, including system and exec. It is also possible to redirect standard IO to a socket. This may immediately lead to a local compromise of the Oracle user.


On Windows based systems, the call is run within the local SYSTEM security context. On Unix systems, the Listener may run with user-level privileges.

Exploit: There is no exploit code.

Remote: Yes


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »