OracleDB TNS Listener Remote Poisoning Vulnerability Exploit Update

Oracle Database Server is prone to a remote vulnerability that allows attackers to poison the data handled by the remote 'TNS Listener' component of the application. This module tries to verify if the vulnerability is present in the 'TNS Listener' component of the database server, without deploying an agent. If a database instance name is supplied, it will be used to check for the vulnerability against the TNS listener of the target, but this could affect future client connections, as long as the module is running. If no database instance name is supplied, the module will try to register a random name. This update adds a default TNS connection timeout to the tns library.
Exploit type: 
Platform: 
Product Version: 
2016_R1
Released Date: 
Thursday, September 29, 2016 - 00:00