SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   Oracle Database Vendors:   Oracle
Oracle Database Multiple Flaws Let Remote and Local Users Access and Modify Data and Gain Elevated Privileges and Let Local Users Deny Service
SecurityTracker Alert ID:  1037035
SecurityTracker URL:  http://securitytracker.com/id/1037035
CVE Reference:   CVE-2010-5312, CVE-2016-3562, CVE-2016-5497, CVE-2016-5498, CVE-2016-5499, CVE-2016-5505, CVE-2016-5516, CVE-2016-5555, CVE-2016-5572   (Links to External Site)
Date:  Oct 18 2016
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 11.2.0.4, 12.1.0.2
Description:   Multiple vulnerabilities were reported in Oracle Database. A remote and local user can access data on the target system. A remote user can modify data on the target system. A local user can cause denial of service conditions on the target system. A local user can obtain elevated privileges on the target system. A remote authenticated user can gain elevated privileges.

A remote authenticated user can exploit a flaw in the OJVM component to gain elevated privileges [CVE-2016-5555].

A local user can exploit a flaw in the Kernel PDB component to gain elevated privileges [CVE-2016-5572].

A local user can exploit a flaw in the RDBMS Security component to gain elevated privileges [CVE-2016-5497].

A remote user can exploit a flaw in the Application Express component to partially access and partially modify data [CVE-2010-5312].

A local user can exploit a flaw in the Kernel PDB component to cause denial of service conditions [CVE-2016-5516].

A local user can exploit a flaw in the RDBMS Programmable Interface component to access data [CVE-2016-5505].

A local user can exploit a flaw in the RDBMS Security component to partially access data [CVE-2016-5498, CVE-2016-5499].

A remote authenticated user can exploit a flaw in the RDBMS Security and SQL*Plus component to partially access data [CVE-2016-3562].

The following researchers reported these and other Oracle product vulnerabilities:

Abhishek Singh; Alejo Popovici; Alexander Kornbrust of Red Database Security; Amichai Shulman of Imperva, Inc.; Ariel Walter Garcia; Behzad Najjarpour Jabbari, Secunia Research at Flexera Software; bo13oy of Trend Micro's Zero Day Initiative;
Cezar Santos; David Litchfield of Google; Dawid Golunski; Denis Shpektorov; Devin Rosenbauer of Identity Works LLC; Felix Wilhelm; Hunter Liu of Huawei's IT Infrastructure & Security Dept, BPIT&QM; Jackson Thuraisamy of Security Compass;
Jacob Baines - Tenable Network Security (via Trend Micro's Zero Day Initiative); Jakub Palaczynski of ING Services Polska; John Page (hyp3rlinx); Jordan Milne; Mateusz Guzik; Matias Mevied of Onapsis; Matthias Kaiser of Code White;
Michael Miller of Integrigy; Okan Basegmez of DORASEC Consulting; Pete Finnigan; Peter Moody; Rahmat Nur Fauzi; Reno Robert; Rex Dale Stevens; Sahar Sabban of Intel; Suraj Khetani of Gulf Business Machines; Sven Blumenstein of Google; Tommy DeVoss of Evolution Security; Valentin Dornauer; and Vishnu Padmakumar.

Impact:   A remote user can obtain data on the target system.

A remote user can modify data on the target system.

A local user can cause denial of service conditions on the target system.

A local user can obtain data on the target system.

A local user can obtain elevated privileges on the target system.

A remote authenticated user can gain elevated privileges on the target system.

Solution:   The vendor has issued a fix as part of the October 2016 Oracle Critical Patch Update.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (2003), Windows (2008), Windows (2012)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC