Oracle Siebel Enterprise Bugs Let Remote Users Access and Modify Data and Let Local Users Access Data
|
SecurityTracker Alert ID: 1036400 |
SecurityTracker URL: http://securitytracker.com/id/1036400
|
CVE Reference:
CVE-2016-3450, CVE-2016-3469, CVE-2016-3472, CVE-2016-3475, CVE-2016-3476, CVE-2016-5450, CVE-2016-5451, CVE-2016-5456, CVE-2016-5459, CVE-2016-5460, CVE-2016-5461, CVE-2016-5462, CVE-2016-5463, CVE-2016-5464, CVE-2016-5466, CVE-2016-5468
(Links to External Site)
|
Date: Jul 20 2016
|
Impact:
Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
Multiple vulnerabilities were reported in Oracle Siebel Enterprise. A remote user can access and modify data on the target system. A local user can access data on the target system.
A remote authenticated user can exploit a flaw in the Siebel UI Framework EAI component to access and modify data [CVE-2016-5451].
A remote user can exploit a flaw in the Oracle Knowledge Information Manager Console component to partially access and partially modify data [CVE-2016-3476].
A remote authenticated user can exploit a flaw in the Siebel Core - Server Framework Object Manager component to access data [CVE-2016-5461].
A remote authenticated user can exploit a flaw in the Siebel Engineering - Installer and Deployment Web Server component to access data [CVE-2016-3472].
A remote authenticated user can exploit a flaw in the Siebel UI Framework EAI component to partially access and partially modify data [CVE-2016-5468].
A remote authenticated user can exploit a flaw in the Siebel Core - Server Framework Services component to access data [CVE-2016-5456].
A remote user can exploit a flaw in the Siebel Core - Common Components iHelp component to partially modify data [CVE-2016-5459].
A remote user can exploit a flaw in the Siebel UI Framework UIF Open UI component to partially modify data [CVE-2016-5450].
A remote authenticated user can exploit a flaw in the Oracle Knowledge Information Manager Console component to partially access data [CVE-2016-3475].
A remote authenticated user can exploit a flaw in the Siebel UI Framework SWSE Server component to partially modify data [CVE-2016-5463, CVE-2016-5464].
A remote user can exploit a flaw in the Siebel Core - Server Framework Services component to partially access data [CVE-2016-3450, CVE-2016-3469, CVE-2016-5460, CVE-2016-5466].
A remote authenticated user can exploit a flaw in the Siebel Core - Server Framework Workspaces component to partially access data [CVE-2016-5462].
The following researchers reported these and other Oracle product vulnerabilities:
Accenture TVM Prague; Adam Willard of Raytheon Foreground Security; Alexander Kornbrust of Red Database Security; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Alvaro Munoz of Trend Micro's Zero Day Initiative; Ben Lincoln of NCC Group; Brian Martin of Tenable Network Security; Bruno Cirone; Christian Schneider; David Litchfield of Google;
Devin Rosenbauer of Identity Works LLC; Aleksandar Nikolic of Cisco Talos; Jack Fei of FINRA; Juan Manuel Fernandez Torres of Telefonica.com; Kasper Andersen; Matias Mevied of Onapsis; Matthias Kaiser of Code White; Matthias-Christian Ott; Nicholas Lemonias of Advanced Information Security Corporation; Nicolas Collignon of synacktiv; Reno Robert; Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.; Stephan Borosh of Veris Group, LLC; Stephen Kost of Integrigy;
Steven Seeley (via Beyond Security's SSD program); Sven Blumenstein of Google; Teemu Kaariainen; Ubais PK; and XOR19 of Trend Micro's Zero Day Initiative.
|
Impact:
A remote user can access and modify data on the target system.
A local user can obtain data on the target system.
|
Solution:
The vendor has issued a fix as part of the July 2016 Oracle Critical Patch Update.
The vendor's advisory is available at:
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
|
Vendor URL: www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html (Links to External Site)
|
Cause:
Not specified
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2003)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|