### [CVE-2012-1675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1675) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison." ### POC #### Reference - http://seclists.org/fulldisclosure/2012/Apr/204 - http://seclists.org/fulldisclosure/2012/Apr/343 - http://www.kb.cert.org/vuls/id/359816 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/bongbongco/CVE-2012-1675 - https://github.com/oneplus-x/jok3r - https://github.com/quentinhardy/odat - https://github.com/rohankumardubey/odat - https://github.com/rossw1979/ODAT - https://github.com/shakenetwork/odat