Oracle Training Oracle Support Development Oracle Apps

 E-mail Us
 Oracle Articles
New Oracle Articles

 Oracle Training
 Oracle Tips

 Oracle Forum
 Class Catalog

 Remote DBA
 Oracle Tuning
 Emergency 911
 RAC Support
 Apps Support
 Oracle Support

 SQL Tuning

 Oracle UNIX
 Oracle Linux
 Remote s
 Remote plans
 Application Server

 Oracle Forms
 Oracle Portal
 App Upgrades
 SQL Server
 Oracle Concepts
 Software Support

 Remote S


 Consulting Staff
 Consulting Prices
 Help Wanted!


 Oracle Posters
 Oracle Books

 Oracle Scripts

Don Burleson Blog 







Linda Webb

Got breaking Oracle news?    Burleson Consulting Oracle News

Click here for more Oracle News Headlines


MOSC responds to Oracle worm threat

Oracle MOSC has placed a note regarding the potential threat from the Oracle "worm" that was designed specifically to attack Oracle databases:
This offer-up some ways to eliminate exposure:
"The following list contains the minimal steps recommended by Oracle to help protect against any attacks on an Oracle database.
1)    Account lock and expire the password for unused default database accounts.  Review infrequently used database accounts and consider account locking, password expiry or setting a more complex password.

2)    For database releases prior to Oracle Database 10g Release 1: you should set an administrative password for the TNS listener.  For Oracle Database 10g Release 1 and later releases, the default authentication mode for the TNS listener is local OS authentication, which requires the TNS listener administrator to be a member of the local dba group.  Setting a password for the TNS listener in Oracle Database 10g Release 1 and higher simplifies administration.  However, setting a password requires good password management to prevent unauthorized users from guessing the password and potentially gaining access to privileged listener operations.  Customers may wish to consider not setting a password for the TNS listener starting with Oracle Database 10g Release 1 because the TNS listener is secure by default without a password in this and later releases.

3)    Revoke the create database link system privilege from database users who don't require it.  Please note that the default Oracle database role resource is granted the create database link system privilege.   Please note that the default Oracle database role connect is also granted the create database link system privilege through Oracle Database 10g Release 1. (The connect role was modified in Oracle Database 10g Release 2 to only be granted the create session system privilege.)

4)    Establish password management policies inside the Oracle database to enforce password complexity, length and expiration.

5)    Consider changing the default port for the Oracle TNS Listener process from 1521."


Oracle Training at Sea
oracle dba poster

Follow us on Twitter 
Oracle performance tuning software 
Oracle Linux poster


Burleson is the American Team

Note: This Oracle documentation was created as a support and Oracle training reference for use by our DBA performance tuning consulting professionals.  Feel free to ask questions on our Oracle forum.

Verify experience! Anyone considering using the services of an Oracle support expert should independently investigate their credentials and experience, and not rely on advertisements and self-proclaimed expertise. All legitimate Oracle experts publish their Oracle qualifications.

Errata?  Oracle technology is changing and we strive to update our BC Oracle support information.  If you find an error or have a suggestion for improving our content, we would appreciate your feedback.  Just  e-mail:  

and include the URL for the page.


Burleson Consulting

The Oracle of Database Support

Oracle Performance Tuning

Remote DBA Services


Copyright © 1996 -  2017

All rights reserved by Burleson

Oracle ® is the registered trademark of Oracle Corporation.

Remote Emergency Support provided by Conversational