{ "id": "CVE-2011-0825", "sourceIdentifier": "secalert_us@oracle.com", "published": "2011-04-20T10:55:01.450", "lastModified": "2012-08-03T04:00:00.000", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Tools 8.9 GA through 8.98.4.1 and OneWorld Tools through 24.1.3 allows remote attackers to affect confidentiality, integrity, and availability, related to Enterprise Infrastructure SEC." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Oracle JD Edwards EnterpriseOne Tools 8.9 GA hasta la 8.98.4.1 y OneWorld Tools hasta la 24.1.3 permite a atacantes remotos vulnerar la confidencialidad, disponibilidad e integridad, relacionado con \"Enterprise Infrastructure SEC\"." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:enterpriseone_tools:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "78A56CBF-DD52-4EC9-942D-062A2D5D4BD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:budle14:*:*:*:*:*:*", "matchCriteriaId": "F2359221-692F-4226-B8BB-A045F4926DC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle14:*:*:*:*:*:*", "matchCriteriaId": "42F9F31D-3074-4418-9566-5DB6C4367EF8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle21:*:*:*:*:*:*", "matchCriteriaId": "FA157884-D3C3-4866-BF66-AA10F93AF433" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle9:*:*:*:*:*:*", "matchCriteriaId": "DF51E618-EFF1-4978-8BFC-B845C8F664D8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "F2332EAE-75EE-415D-84A6-FE0A19D2C71B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "768E4605-1871-435B-8FB6-DDFBD17355CA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8DB2A4D7-4E33-42DC-ABA1-7F0C035974ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_ep:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B73DAAFF-035F-4414-9A96-6A6862378FF0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:oneworld_tools:*:*:*:*:*:*:*:*", "versionEndIncluding": "24.1.3", "matchCriteriaId": "DE3F787C-209A-44A4-8637-2614AC4F4B0E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B402D231-6B6D-4AC6-ABE8-BD4A0D3E5D4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle23:*:*:*:*:*:*", "matchCriteriaId": "1A87B7C8-AD97-4AF1-A1B9-8B9D27D7B19D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "DFF93D30-685A-45FA-A792-D4D3280F064D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*", "matchCriteriaId": "153DA309-9ADA-44D2-A4B8-AAA2B0A5CDAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle41:*:*:*:*:*:*", "matchCriteriaId": "1C51AFAB-4D6B-4A74-8EBF-4D246AFE3937" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:gp_2010-e:*:*:*:*:*:*", "matchCriteriaId": "E9C90A6C-A6C3-4AFD-901A-9BC3FCE47FD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.98.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FB06098-BD09-43CB-988A-AC2C03B6A0C8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_suite_scm:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "AEC26BC4-778F-42BE-926F-AE9FC7394278" } ] } ] } ], "references": [ { "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ] } ] }