Files
CVEs-PoC/2012/CVE-2012-1675.md
2024-06-18 02:51:15 +02:00

28 lines
1.3 KiB
Markdown

### [CVE-2012-1675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1675)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."
### POC
#### Reference
- http://seclists.org/fulldisclosure/2012/Apr/204
- http://seclists.org/fulldisclosure/2012/Apr/343
- http://www.kb.cert.org/vuls/id/359816
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/bongbongco/CVE-2012-1675
- https://github.com/oneplus-x/jok3r
- https://github.com/quentinhardy/odat
- https://github.com/rohankumardubey/odat
- https://github.com/rossw1979/ODAT
- https://github.com/shakenetwork/odat