2024-12-08 03:06:42 +00:00

405 lines
15 KiB
JSON

{
"id": "CVE-2007-3854",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-18T19:30:00.000",
"lastModified": "2024-11-21T00:34:13.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en Oracle Database versiones 9.0.1.5+, 9.2.0.7 y 10.1.0.5, permiten a usuarios autenticados remotoss tener un impacto desconocido por medio de (1) SYS.DBMS_PRVTAQIS en el componente Advanced Queuing (DB02) y (2) MDSYS.MD en el componente Spatial (DB12). NOTA: Oracle no ha cuestionado las afirmaciones de investigadores confiables de que DB02 es para una inyecci\u00f3n SQL y DB12 para un desbordamiento de b\u00fafer."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18E9031D-19DD-4E6D-BDB4-0EC93DB6C8CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:apex:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "574D3EEB-E1D4-4DB3-93D3-0410747EC8BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:apex:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2D813027-4F66-4CFB-A3C4-F5A302B0D9BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:apex:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95351E3F-5B5C-48F1-9137-2CCCE11775AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "F7969E06-9E5E-4264-B235-B0C4C1DB56D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8F5AAE-0365-4E01-AB04-CDC6D58B00B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B4BAA9-D045-4D2B-8220-47F47ED936DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6C4D36-D9D1-4143-94AA-D8E08F23D2E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F01A3ABC-2033-47E0-A84C-62CCA67C578F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB877D9-C8BB-4A08-A953-043F7DB5BA6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8B77FF3B-B84E-4918-8688-0B25CFC61141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9D2A52-5131-4A24-A355-2DACAFFA22D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE059C8C-BA43-4757-8CA6-8E1B67DF8903"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7ABE6-0AFB-4A74-A533-2D390991A6CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*",
"matchCriteriaId": "D86DC2E3-3B89-4FAC-9B8F-DC629B50ADC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "FE7180CD-675E-4311-AE7A-6098EE241965"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8:r2:*:*:*:*:*:*",
"matchCriteriaId": "B2E404AB-7F54-48D5-BFA5-8D08BB3FC6C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8dv:r2:*:*:*:*:*:*",
"matchCriteriaId": "04E72F3A-E839-4CFF-9CB7-1E1FC6F8C8E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "03A522A3-07D7-481F-A538-EA3D13256F63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "26BFEEFD-C652-46A2-A9E7-36210482DD48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "A14DD3F3-2CC4-492A-9C78-9B3C39D7AD17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D07FEA4F-B1C7-4250-81FD-AC1289769348"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78408427-3FFB-45C4-82EF-C8D636B3A718"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B1BE09-4A96-41A3-AA1D-74533F396998"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80B61990-9CC2-4215-9879-AC817F4E6767"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0CBDB5-B13D-4071-994A-E1318A3821DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "610AE265-C18D-4895-8034-5DB331DC68DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA79502-9191-422F-8F45-6CA1B95E1A04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EDD576-D9BE-4478-84FE-833F89930A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D36815-CB02-4F65-988A-1F8B677D2F0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA3A737-0989-478B-BAA6-8DC84E937E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.22:*:*:*:*:*:*:*",
"matchCriteriaId": "31D3B59F-EBAE-410A-9370-BD12956C11B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.47:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2CF929-6203-436A-AAEB-6E2142B2B1F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.48:*:*:*:*:*:*:*",
"matchCriteriaId": "7C098860-0862-4C5B-8EE4-9469D5D01815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*",
"matchCriteriaId": "445508AC-3316-459F-98C1-8310EF327E8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "74835B56-8009-4688-99DC-E6CAD3BEEFD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "184FC430-F68B-4390-90C7-421F968425ED"
}
]
}
]
}
],
"references": [
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143",
"source": "cve@mitre.org"
},
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/26114",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/26166",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1018415",
"source": "cve@mitre.org"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2562",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2635",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497",
"source": "cve@mitre.org"
},
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/26114",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/26166",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1018415",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2562",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2635",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}