Lucene search

K
certCERTVU:105259
HistoryDec 08, 2001 - 12:00 a.m.

Oracle Database Server vulnerable to DoS via repeated requests to Oracle listener without connecting to redirected port

2001-12-0800:00:00
www.kb.cert.org
9

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.028 Low

EPSS

Percentile

90.5%

Overview

Oracle Database Server may consume all available memory and crash if clients do not connect completely in the expected manner.

Description

When a connection request is made to Oracle for Windows NT, Oracle Database Server creates a new thread listening on a new port and redirects the connection to the new port. This new thread remains in memory listening until the client connects to its port or the Oracle Database Server is restarted.


Impact

By making many connection requests to Oracle without connecting to the new threads created to handle the connections, an attacker can force the server to consume all memory with listening threads. Once all server memory is consumed, the next console login attempt will crash the server.


Solution

The CERT/CC is currently unaware of a practical solution to this problem.


Enable tcp.validnode_checking and set tcp.invited_nodes and tcp.excluded_nodes to limit Oracle access to trusted hosts.

Set the following parameters in the Oracle Net8 configuration file PROTOCOL.ORA:

tcp.validnode_checking = YES tcp.invited_nodes = {list of IP addresses} tcp.excluded_nodes = {list of IP addresses}


Vendor Information

105259

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Oracle Corporation __ Affected

Notified: August 27, 2001 Updated: November 17, 2001

Status

Affected

Vendor Statement

“The information that you have posted … is correct. Oracle has proposed the workaround to mitigate the vulnerability as described.”

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23105259 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Internet Security Systems (ISS) for their advisory on this issue.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: CVE-2001-0513
Severity Metric: 3.02 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.028 Low

EPSS

Percentile

90.5%

Related for VU:105259