SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Industry Applications Vendors:   Oracle
Oracle Industry Applications Bugs Let Remote Authenticated Users Partially Access and Modify Data and Local Users Deny Service
SecurityTracker Alert ID:  1029199
SecurityTracker URL:  http://securitytracker.com/id/1029199
CVE Reference:   CVE-2013-3814, CVE-2013-5762, CVE-2013-5811, CVE-2013-5837, CVE-2013-5856, CVE-2013-5857   (Links to External Site)
Date:  Oct 16 2013
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Oracle Industry Applications. A remote authenticated user can partially access and modify data. A local user can cause partial denial of service conditions.

A remote authenticated user can exploit a flaw in Oracle Retail Invoice Matching in the System Administration component to partially access and modify data [CVE-2013-3814].

A remote authenticated user can exploit a flaw in Oracle Health Sciences InForm in the Web component to partially access and modify data [CVE-2013-5856, CVE-2013-5857].

A remote authenticated user can exploit a flaw in Oracle Health Sciences InForm in the Web component to partially access data [CVE-2013-5811].

A local user can exploit a flaw in Oracle Siebel CTMS in the SC-OC Integration component to cause partial denial of service conditions [CVE-2013-5762].

A remote authenticated user can exploit a flaw in Oracle Health Sciences InForm in the Cognos component to partially access data [CVE-2013-5837].

The following researchers reported these and other Oracle vulnerabilities:

Adam Gowdiak of Security Explorations; Adam Willard of Foreground Security; Adi Ludmer of McAfee Labs; Ajinkya Patil of AVsecurity.in; Alex Kouzemtchenko of Security Research Lab via CERT/CC; Alex Rajan of Network Intelligence; Alexander Polyakov of
ERPScan; Alexander Tlyapov of Positive Technologies; Alexey Osipov of Positive Technologies; Alexey Tyurin of ERPScan (Digital Security Research Group); Anagha Devale-Vartak of AVsecurity.in; Andrea Micalizzi aka rgod, working with HP's Zero Day
Initiative; Andrew Davies formerly of NCC Group; Ben Murphy via HP's Zero Day Initiative; CERT/CC; Chris Ries via the Exodus Intelligence Program; Dave Bryant of Orion Health; Dmitry Sklyarov of Positive Technologies; Esteban Martinez Fayo formerly
of Application Security Inc.; HUAWEI PSIRT; James Forshaw of Context Information Security; Jeroen Frijters; Jon Passki of Security Research Lab via CERT/CC; Juraj Somorovsky of Ruhr-University Bochum; Manuel Garcia Cardenas of Internet Security
Auditors; Positive Research Center (Positive Technologies Company); Qinglin Jiang formerly of Application Security Inc; Rohan Stelling of BAE Systems Detica; Sam Thomas of Pentest Limited; Timur Yunusov of Positive Technologies; Tom Parker of Orion
Health; Travis Emmert via iDefense; Vinesh N. Redkar; Will Dormann of CERT/CC; and Yuki Chen of Trend Micro.

Impact:   A remote authenticated user can partially access and modify data.

A local user can cause partial denial of service conditions.

Solution:   The vendor has issued a fix as part of Oracle Critical Patch Update Advisory - October 2013.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2000), Windows (2003), Windows (Vista)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC