Short Name |
DB:ORACLE:TNS:OVERFLOW_MSG |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
DB |
Keywords |
TNS Message overflow |
Release Date |
2005/10/24 |
Update Number |
1213 |
Supported Platforms |
This anomaly triggers if it detects that the Transparent Network Substrate (TNS) part of a packet, in a message, is longer then expected. A malformed message, with a longer than normal TNS packet part, can indicated an attempt to compromise your system.
Overly long TNS packet parts constitute a protocol anomaly. Such a condition could indicate a TNS configuration or implementation error. It also could indicate that an attack against the TNS service is underway.