mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
108 lines
3.5 KiB
JSON
108 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2008-2613",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Unspecified vulnerability in the Database Scheduler component in Oracle Database 10.2.0.4 and 11.1.0.6 has unknown impact and local attack vectors. NOTE: the previous information was obtained from the Oracle July 2008 CPU. Oracle has not commented on reliable researcher claims that this is an untrusted search path issue that allows local users to gain privileges via a malicious (1) libclntsh.so or (2) libnnz10.so library."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20080715 Oracle Database Local Untrusted Library Path Vulnerability",
|
|
"refsource" : "IDEFENSE",
|
|
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=727"
|
|
},
|
|
{
|
|
"name" : "20080719 Oracle Database Local Untrusted Library Path Vulnerability",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/494544/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html"
|
|
},
|
|
{
|
|
"name" : "HPSBMA02133",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
|
|
},
|
|
{
|
|
"name" : "SSRT061201",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143"
|
|
},
|
|
{
|
|
"name" : "ADV-2008-2115",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2008/2115"
|
|
},
|
|
{
|
|
"name" : "ADV-2008-2109",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2008/2109/references"
|
|
},
|
|
{
|
|
"name" : "1020499",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id?1020499"
|
|
},
|
|
{
|
|
"name" : "31113",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31113"
|
|
},
|
|
{
|
|
"name" : "31087",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/31087"
|
|
}
|
|
]
|
|
}
|
|
}
|