Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-1675
Modified
More InfoOfficial Page
Source-secalert_us@oracle.com
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2012 | 22:55
Updated At-29 Apr, 2026 | 01:13

The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Oracle Corporation
oracle
>>database_server>>10.2.0.3
cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>10.2.0.4
cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>10.2.0.5
cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>11.1.0.7
cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>11.2.0.2
cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>11.2.0.3
cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>database_server>>11.2.0.4
cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.htmlsecalert_us@oracle.com
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2012/Apr/204secalert_us@oracle.com
Exploit
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2012/Apr/343secalert_us@oracle.com
Mailing List
Third Party Advisory
http://www.kb.cert.org/vuls/id/359816secalert_us@oracle.com
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150secalert_us@oracle.com
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.htmlsecalert_us@oracle.com
Vendor Advisory
http://www.securityfocus.com/bid/53308secalert_us@oracle.com
Exploit
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1027000secalert_us@oracle.com
Third Party Advisory
VDB Entry
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012secalert_us@oracle.com
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303secalert_us@oracle.com
VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2012/Apr/204af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2012/Apr/343af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.kb.cert.org/vuls/id/359816af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/53308af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1027000af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://blogs.oracle.com/security/entry/security_alert_for_cve_2012af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75303af854a3a-2127-422b-91ae-364da2661108
VDB Entry
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2012/Apr/204
Source: secalert_us@oracle.com
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2012/Apr/343
Source: secalert_us@oracle.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/359816
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html
Source: secalert_us@oracle.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/53308
Source: secalert_us@oracle.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1027000
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://blogs.oracle.com/security/entry/security_alert_for_cve_2012
Source: secalert_us@oracle.com
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/75303
Source: secalert_us@oracle.com
Resource:
VDB Entry
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2012/Apr/204
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2012/Apr/343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/359816
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/53308
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1027000
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://blogs.oracle.com/security/entry/security_alert_for_cve_2012
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/75303
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
VDB Entry
Change History
0Changes found

Details not found