SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Hospitality Applications Vendors:   Oracle
Oracle Hospitality Applications Multiple Flaws Let Remote and Local Users Access Data, Remote Authenticated Users Modify Data and Deny Service, and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1041300
SecurityTracker URL:  http://securitytracker.com/id/1041300
CVE Reference:   CVE-2017-0785, CVE-2018-2955, CVE-2018-2956, CVE-2018-2957, CVE-2018-2978, CVE-2018-2984, CVE-2018-3000, CVE-2018-3001, CVE-2018-3002, CVE-2018-3003, CVE-2018-3013, CVE-2018-3014   (Links to External Site)
Date:  Jul 17 2018
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Oracle Hospitality Applications. A remote or local user can access data on the target system. A remote authenticated user can modify data on the target system. A remote authenticated user can cause denial of service conditions on the target system. A local user can obtain elevated privileges on the target system.

A remote authenticated user can exploit a flaw in the Oracle Hospitality Cruise Fleet Management System Gangway Activity Web App component to access and modify data [CVE-2018-2984].

A local user can exploit a flaw in the Oracle Hospitality OPERA 5 Property Services Integration component to gain elevated privileges [CVE-2018-2956].

A remote user can exploit a flaw in the Oracle Hospitality OPERA 5 Property Services Logging component to access data [CVE-2018-2957].

A local user can exploit a flaw in the Oracle Hospitality Cruise Fleet Management System Fleet Management System Suite component to access data [CVE-2018-3002].

A local user can exploit a flaw in the Oracle Hospitality Cruise Shipboard Property Management System SPMS Suite component to access data [CVE-2018-3000].

A remote authenticated user can exploit a flaw in the Oracle Hospitality Simphony Import/Export component to access data, modify data, and partially deny service [CVE-2018-2978].

A remote authenticated user can exploit a flaw in the Oracle Hospitality OPERA 5 Property Services Report Server Config component to access data [CVE-2018-3013].

A remote authenticated user can exploit a flaw in the Oracle Hospitality OPERA 5 Property Services Reports component to access data [CVE-2018-3014].

A local user can exploit a flaw in the MICROS Handheld Terminal MC40 Zebra Handheld unit (WiFi) component to access data [CVE-2017-0785].

A local user can exploit a flaw in the Oracle Hospitality Cruise Fleet Management System Fleet Management System Suite component to access data [CVE-2018-3003].

A local user can exploit a flaw in the Oracle Hospitality Cruise Shipboard Property Management System SPMS Suite component to access data [CVE-2018-3001].

A remote user can exploit a flaw in the Oracle Hospitality OPERA 5 Property Services Integration component to partially access data [CVE-2018-2955].

Gregory Smiley of Security Compass and Jackson Thuraisamy of Security Compass reported some of these vulnerabilities.

Impact:   A remote user can obtain data on the target system.

A remote authenticated user can modify data on the target system.

A remote authenticated user can cause denial of service conditions on the target system.

A local user can obtain data on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix as part of the July 2018 Critical Patch Update.

The vendor advisory is available at:

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Vendor URL:  www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC