5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.028 Low
EPSS
Percentile
90.5%
Oracle Database Server may consume all available memory and crash if clients do not connect completely in the expected manner.
When a connection request is made to Oracle for Windows NT, Oracle Database Server creates a new thread listening on a new port and redirects the connection to the new port. This new thread remains in memory listening until the client connects to its port or the Oracle Database Server is restarted.
By making many connection requests to Oracle without connecting to the new threads created to handle the connections, an attacker can force the server to consume all memory with listening threads. Once all server memory is consumed, the next console login attempt will crash the server.
The CERT/CC is currently unaware of a practical solution to this problem.
Enable tcp.validnode_checking
and set tcp.invited_nodes
and tcp.excluded_nodes
to limit Oracle access to trusted hosts.
Set the following parameters in the Oracle Net8 configuration file PROTOCOL.ORA
:
tcp.validnode_checking = YES tcp.invited_nodes = {list of IP addresses} tcp.excluded_nodes = {list of IP addresses}
105259
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: August 27, 2001 Updated: November 17, 2001
Affected
“The information that you have posted … is correct. Oracle has proposed the workaround to mitigate the vulnerability as described.”
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23105259 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Internet Security Systems (ISS) for their advisory on this issue.
This document was written by Shawn Van Ittersum.
CVE IDs: | CVE-2001-0513 |
---|---|
Severity Metric: | 3.02 Date Public: |