SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Industry Applications Vendors:   Oracle
Oracle Industry Applications Bugs Let Remote Authenticated Users Partially Access and Modify Data
SecurityTracker Alert ID:  1028441
SecurityTracker URL:  http://securitytracker.com/id/1028441
CVE Reference:   CVE-2013-1520, CVE-2013-1525, CVE-2013-2397   (Links to External Site)
Date:  Apr 17 2013
Impact:   Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 13.0, 13.1, 13.2, 13.3, 13.4
Description:   Several vulnerabilities were reported in Oracle Industry Applications. A remote authenticated user can partially access and modify data on the target system.

A remote authenticated user can exploit a flaw in the Oracle Clinical Remote Data Capture Option HTML Surround component to partially access and modify data on the target system [CVE-2013-1520].

A remote authenticated user can exploit a flaw in the Oracle Retail Central Office Customer Operations (Add, Search) component to partially access and modify data on the target system [CVE-2013-2397].

A remote authenticated user can exploit a flaw in the Oracle Retail Integration Bus Retail Integration Bus Manager component to partially access data on the target system [CVE-2013-1525].

The following researchers reported these and other Oracle product vulnerabilities:

Aaron Portnoy of Exodus Intelligence; Alex Mor of Ernst & Young; Andrea Micalizzi aka rgod, working with HP's Zero Day Initiative; Andrew Davies formerly of NCC Group; Andy Davis of NCC Group; Behrang Fouladi of SensePost Information Security; Borked of the Google Security Team; Fernando Munoz via Secunia SVCRP; Fernando Munoz; Francis Provencher via HP's Zero Day Initiative; Jakub Wartak via iDefense Labs; K. Gudinavicius of SEC Consult; Mike Gerdts formerly of GE; Oliver Gruskovnjak of Portcullis Inc; Oren Hafif of Ernst & Young; Pavel Toporkov of Positive Technologies; Rajat Swarup of AT&T Consulting; Recx; River Tarnell of Wikimedia Deutschland; Rohan Stelling of BAE Systems Detica; Tan, Kean Siong of KPMG Management Consulting, Singapore; Travis Emmert; and Travis Emmert via iDefense.

Impact:   A remote authenticated user can partially access and modify data on the target system.
Solution:   The vendor has issued a fix as part of the Oracle Critical Patch Update Advisory - April 2013.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2000), Windows (2003), Windows (Vista)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC