Skip to content

Commit d242bc2

Browse files
author
Tod Beardsley
committed
Minor fixups and disclosure date for TNS module
1 parent 955a514 commit d242bc2

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

modules/auxiliary/scanner/oracle/tnspoison_checker.rb

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,24 @@ def initialize(info = {})
1616
'Name' => 'Oracle TNS Listener Checker',
1717
'Description' => %q{
1818
This module checks the server for vulnerabilities like TNS Poison.
19-
Module sends to server a packet with command to register new TNS Listener and check response.
19+
Module sends a server a packet with command to register new TNS Listener and checks
20+
for a response indicating an error. If the registration is errored, the target is not
21+
vulnearble. Otherwise, the target is vulnerable to malicious registrations.
2022
},
2123
'Author' => ['ir0njaw (Nikita Kelesis) <nikita.elkey[at]gmail.com>'], # of Digital Security [http://dsec.ru]
2224
'References' =>
2325
[
2426
[ 'URL', 'http://seclists.org/fulldisclosure/2012/Apr/204' ],
2527
],
28+
'DisclosureDate' => 'Apr 18 2012',
2629
'License' => MSF_LICENSE))
2730

2831
register_options(
2932
[
3033
Opt::RPORT(1521)
3134
], self.class)
3235

33-
deregister_options('RHOST')
36+
deregister_options('RHOST') # Provided by the TNS mixin, but not needed in a scanner module
3437
end
3538

3639
def run_host(ip)
@@ -41,6 +44,7 @@ def run_host(ip)
4144
packet = sock.read(100)
4245
find_packet = packet.include? "(ERROR_STACK=(ERROR="
4346
find_packet == true ? print_error("#{ip}:#{rport} is not vulnerable ") : print_good("#{ip}:#{rport} is vulnerable")
47+
#TODO: Module should report_vuln if this finding is solid.
4448
rescue ::Rex::ConnectionError, ::Errno::EPIPE
4549
print_error("#{ip}:#{rport} unable to connect to the server")
4650
end

0 commit comments

Comments
 (0)