SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Supply Chain Products Suite Vendors:   Oracle
Oracle Supply Chain Products Suite Bugs Let Remote Users Partially Access Data and Remote Authenticated Users Partially Access Data, Modify Data, and Partially Deny Service
SecurityTracker Alert ID:  1032124
SecurityTracker URL:  http://securitytracker.com/id/1032124
CVE Reference:   CVE-2015-0462, CVE-2015-0463, CVE-2015-0464, CVE-2015-0465, CVE-2015-0490, CVE-2015-2570   (Links to External Site)
Date:  Apr 15 2015
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6
Description:   Multiple vulnerabilities were reported in Oracle Supply Chain Products Suite. A remote user can partially access data on the target system. A remote authenticated user can partially access and modify data on the target system. A remote authenticated user can cause partial denial of service conditions on the target system.

A remote authenticated user can exploit a flaw in the Oracle Demand Planning Security component to partially access data, partially modify data, and partially deny service [CVE-2015-2570].

A remote user can exploit a flaw in the Oracle Transportation Management Security component to partially access data [CVE-2015-0464].

A remote authenticated user can exploit a flaw in the Oracle Agile Engineering Data Management Base Component component to partially access and partially modify data [CVE-2015-0490].

A remote authenticated user can exploit a flaw in the Oracle Transportation Management Security component to partially access data [CVE-2015-0462].

A remote authenticated user can exploit a flaw in the Oracle Transportation Management Security component to partially access data [CVE-2015-0463].

A remote authenticated user can exploit a flaw in the Oracle Transportation Management UI Infrastructure component to partially access data [CVE-2015-0465].

The following researchers reported these and other Oracle product vulnerabilities:

An Anonymous Reporter working at HTL Leonding; Brandon Vincent; Christopher E. Walter; Daniel Ekberg of Swedish Public Employment Service; David Litchfield of Datacom TSS; Dmitry Janushkevich of Secunia Research; Florian Weimer of Red Hat;
Francis Provencher of Protek Research Lab; Jihui Lu of KeenTeam; Lupin LanYuShi; Mark Litchfield of Securatary; Markus Millbourn of Digifort; Martin Carpenter of Citco; Mateusz Jurczyk of Google Project Zero; Michael Miller of Integrigy;
Moshe Zioni of Comsec Consulting; Ofer Maor formerly of Hacktics; Paul M. Wright; Robbe De Keyzer of The Security Factory; Roberto Soares of Conviso Application Security; Sajith Shetty; Sasha Raljic; Shai Rod of Avnet Information Security;
Steven Seeley of HP's Zero Day Initiative; Tudor Enache of Help AG; Vishal V. Sonar of Control Case International Pvt Ltd.; and Wouter Coekaerts.

Impact:   A remote user can partially access data on the target system.

A remote authenticated user can partially access and modify data on the target system.

A remote authenticated user can cause partial denial of service conditions on the target system.

Solution:   The vendor has issued a fix as part of Oracle Critical Patch Update Advisory - April 2015.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC