OracleDatabaseServerTNSListener远程数据投毒漏洞(CVE-
2。。。
⼀、解决⽅案
1. RAC:
2. ⾮ RAC:
⼆、简单举例:⾮ RAC 操作步骤,1453883.1⽂档中 1)
1. 解决⽅案分两种
1. Restricting registration to the TCP protocol (Requires the fix for BUG:12880299)
2. Restricting registration to the IPC protocol (The patch for BUG:12880299 is NOT required for the IPC method)
2. 添加"SECURE_REGISTER_[listener_name] = (TCP)"
LISTENER_PROD =
(DESCRIPTION_LIST =
(DESCRIPTION =
(ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.66.101)(PORT = 1521))
))
SECURE_REGISTER_LISTENER_PROD = (TCP)
cve漏洞库3. 重启监听
4. 注册监听
1. SQL> alter system register;
5. 校验
1.
1. 设置remote_listener参数
alter system set remote_listener='(ADDRESS=(PROTOCOL=TCP)(HOST=192.168.66.101)(PORT=15
51))' scope=memory;
2. 查看监听服务状态
lsnrctl services listener
3. 如果remote状态没有或为block状态,则为成功
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论