SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle PeopleSoft Products Vendors:   Oracle
Oracle PeopleSoft PeopleTools Bugs Let Remote Authenticated Users Access and Modify Data and Cause Denial of Service Conditions
SecurityTracker Alert ID:  1023061
SecurityTracker URL:  http://securitytracker.com/id/1023061
CVE Reference:   CVE-2009-3404, CVE-2009-3405, CVE-2009-3406, CVE-2009-3409   (Links to External Site)
Date:  Oct 20 2009
Impact:   Denial of service via network, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.49.23
Description:   Several vulnerabilities were reported in Oracle PeopleSoft PeopleTools and related components. A remote authenticated user can access and modify some data on the target database. A remote authenticated user can cause denial of service conditions.

No details were provided.

The JD Edwards Tools [CVE-2009-3405, CVE-2009-3406], PeopleSoft Enterprise HCM (TAM) [CVE-2009-3409], and PeopleSoft PeopleTools & Enterprise Portal [CVE-2009-3404] components are affected.

The following researchers reported these and other Oracle vulnerabilities:

Yaniv Azaria of Imperva, Inc.; Cesar Cerrudo of Argeniss; Deniz Cevik of Intellect; Joxean Koret; Joxean Koret of iSIGHT Partners Global Vulnerability Partnership; Alexander Kornbrust of Red Database Security; David Litchfield of NGS Software; Ryan Permeh of McAfee Avert labs; Guy Pilosof of Sentrigo; Aviv Pode of Sentrigo; Alexandr Polyakov of Digital Security; Pawel Romanek of Asseco Business Solutions; Amichai Shulman of Imperva, Inc.; Rajat Swarup; Laszlo Toth; Luka Treiber of ACROS Security; Wei Wang of McAfee Avert labs; and Dennis Yurichev.

Impact:   A remote authenticated user can access and modify some data on the target database.

A remote authenticated user can cause denial of service conditions.

Solution:   The vendor has issued a fix, described in their Oct 2009 Critical Patch Update advisory.

The Oracle advisory is available at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html

Vendor URL:  www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC