{"vuid":"VU#301059","idnumber":"301059","name":"Oracle TNS Listener Control Utility (LSNRCTL) contains format string vulnerability","keywords":["Oracle","TNS","Listener Control utility","remotely exploitable","format string","ADMIN_RESTRICTIONS","LSNRCTL","NISR14082002","#NISR14082002"],"overview":"The Oracle Listener Control Utility (LSNRCTL) contains a format string vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code or commands or cause a denial of service.","clean_desc":"Oracle Transparent Network Substrate (TNS ) Listeners are processes that receive connection requests from clients and return information for the clients to use to make database connections. The Listener Control Utility (LSNRCTL) is used to administer Listeners, and has the ability to establish an Oracle Net connection to remote Listeners. When used to administer a Listener, the Listener Control Utility parses the Listener's configuration file ($ORACLE_HOME/NETWORK/ADMIN/LISTENER.ORA for the default Listener). The Listener Control Utility contains a format string vulnerability that could be exploited when the utility parses commands that are supplied directly to it or read from a Listener configuration file. By default, unauthenticated users can control Oracle Listeners and modify their configuration files. By inserting crafted entries containing format string specifiers into a Listener configuration file, an attacker could cause the Listener Control Utility to execute arbitrary code or commands or crash the utility, preventing its use by legitimate users. An attacker with sufficient privileges can supply crafted commands containing format string specifiers directly to a vulnerable Listener Control Utility. In one possible scenario, an attacker could modify a Listener configuration file and wait for a legitimate user, such as a database administrator (DBA), to run the Listener Control Utility. Any code or commands supplied by the attacker would execute with the privileges of the user who ran the Listener Control Utility.","impact":"An unauthenticated remote attacker could execute arbitrary code or commands or cause a denial of service on a vulnerable system.","resolution":"Apply a Patch Apply the appropriate patch as referenced in Oracle Security Alert #40.","workarounds":"Restrict Access to the Listener Control Utility Restrict access to Oracle Listeners to trusted users, hosts, and networks. Use firewall or router access control lists (ACLs) to restrict connections to the port(s) used by Oracle Listeners, 1521/tcp by default. Enable the Oracle Net feature called \"TCP valid node checking\" by modifying $ORACLE_HOME/NETWORK/ADMIN/SQLNET.ORA ($ORACLE_HOME/NETWORK/ADMIN/PROTOCOL.ORA in Oracle8i and prior releases) as follows: tcp.validnode_checking = YES\ntcp.invited_nodes = {list of IP addresses}\ntcp.excluded_nodes = {list of IP addresses}\nConfigure Oracle listeners with encrypted passwords. Set more restrictive file permissions on Listener configuration files ($ORACLE_HOME/NETWORK/ADMIN/LISTENER.ORA for the default Listener). Disable the runtime modification of Oracle listener parameters by modifying $ORACLE_HOME/NETWORK/ADMIN/LISTENER.ORA as follows: ADMIN_RESTRICTIONS_listener_name=on\nNote that these workarounds are designed to limit access; they may not prevent exploitation of this vulnerability.","sysaffected":"","thanks":"The CERT/CC thanks David Litchfield of \nNGSSoftware\n for information used in this document.","author":"This document was written by Art Manion.","public":["http://www.nextgenss.com/advisories/ora-lsnrfmtstr.txt","http://www.nextgenss.com/vna/ora-lsnrctl.txt","http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf","http://otn.oracle.com/deploy/security/pdf/oow00/orahack.pdf","http://www.securityfocus.com/bid/5460","http://www.iss.net/security_center/static/9832.php","http://securitytracker.com/alerts/2002/Aug/1005037.html"],"cveids":["CVE-2002-0857"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-05-29T15:58:12Z","publicdate":"2002-05-27T00:00:00Z","datefirstpublished":"2002-06-04T19:59:02Z","dateupdated":"2003-06-02T19:06:04Z","revision":47,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"9","cam_impact":"18","cam_easeofexploitation":"9","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.48175","cam_scorecurrentwidelyknown":"13.66875","cam_scorecurrentwidelyknownexploited":"24.60375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.48175,"vulnote":null}