SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Calendar)  >   Sun Java System Calendar Server Vendors:   Oracle
Oracle Communications Unified Calendar Server Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1026535
SecurityTracker URL:  http://securitytracker.com/id/1026535
CVE Reference:   CVE-2011-3565, CVE-2011-3570, CVE-2011-3573, CVE-2011-3574   (Links to External Site)
Date:  Jan 18 2012
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0
Description:   Several vulnerabilities were reported in Oracle Communications Unified Calendar Server. A local user can partially access and modify data on the target system. A remote authenticated or local user can cause partial denial of service conditions.

A local user can partially access and modify data [CVE-2011-3565, CVE-2011-3570, CVE-2011-3574].

A remote authenticated user can partially deny service [CVE-2011-3573].

The following researchers reported these and other Oracle vulnerabilities:

An Anonymous Reporter of TippingPoint's Zero Day Initiative; Behrang Fouladi of SensePost Information Security; Chris Wysopal of Veracode; Clement Lecigne; Dennis Yurichev of McAfee Labs; Gorkem Yakin; InfoWorld; Juan Pablo Perez Etchegoyen of Onapsis; Mateusz "j00ru" Jurczyk; Michael Myngerbayev of McAfee Labs; Michael Oglesby of True Digital Security; Minetoshi Takizawa through JPCERT/CC Vulnerability Handling Team; Robert Maly of Ness Technologies; Rohan Stelling of Stratsec Research; and Will Dormann of CERT/CC.

Impact:   A local user can partially access and modify data on the target system.

A remote authenticated or local user can cause partial denial of service conditions.

Solution:   The vendor has issued a fix, described in their January 2012 Critical Patch Update advisory.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpujan2012-366304.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC