O112-BP-022700 - The Oracle Listener must be configured to require administration authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Oracle listener authentication helps prevent unauthorized administration of the Oracle listener. Unauthorized administration of the listener could lead to DoS exploits; loss of connection audit data, unauthorized reconfiguration or other unauthorized access. This is a Category I finding because privileged access to the listener is not restricted to authorized users. Unauthorized access can result in stopping of the listener (DoS) and overwriting of listener audit logs.

Solution

Configure the listener to use Local OS Authentication. This setting prevents remote administration of the listener, restricts management to the Oracle listener owner account (UNIX) and accounts with administrator privileges (WIN).

Remote administration of the listener should not be permitted. If listener administration from a remote system is required, granting secure remote access to the Oracle DBMS server and performing local administration is preferred. Authorize and document this requirement in the System Security Plan.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11-2g_V2R3_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Rule-ID|SV-219710r401224_rule, STIG-ID|O112-BP-022700, STIG-Legacy|SV-68231, STIG-Legacy|V-53991, Vuln-ID|V-219710

Plugin: Windows

Control ID: 7e4f3223f8f8b64053ebf53c2a5cfd3f52b03d8b7b2640967e6bb257f1f68f35