René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.6 KiB
JSON

{
"id": "CVE-2011-2264",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2011-07-21T00:55:01.003",
"lastModified": "2014-01-14T04:09:17.193",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows context-dependent attackers to affect confidentiality, integrity, and availability via unknown vectors related to Outside In Filters. NOTE: the previous information was obtained from the July 2011 CPU. Oracle has not commented on claims from a reliable third party that this is a stack-based buffer overflow in the imcdr2.flt library for the CorelDRAW parser."
},
{
"lang": "es",
"value": "Una vulnerabilidad no especificada en el componente Oracle Outside In Technology en Fusion Middleware de Oracle versiones 8.3.2.0 y 8.3.5.0, permite que los atacantes dependiendo del contexto afectar la confidencialidad, integridad y disponibilidad por medio de vectores desconocidos relacionados con Outside In Filters. NOTA: la informaci\u00f3n anterior fue obtenida de la CPU de julio de 2011. Oracle no ha comentado sobre las afirmaciones de un tercero confiable de que se trata de un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en la biblioteca imcdr2.flt por el analizador CorelDRAW."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:8.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A378066-5F66-4592-B552-EECCE6D6CD31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:8.3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5EE411-1F96-4BAC-931B-50A214E57D04"
}
]
}
]
}
],
"references": [
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/103425",
"source": "secalert_us@oracle.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html",
"source": "secalert_us@oracle.com",
"tags": [
"US Government Resource"
]
}
]
}