René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

115 lines
4.4 KiB
JSON

{
"id": "CVE-2020-14741",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-10-21T15:15:15.810",
"lastModified": "2020-10-23T16:47:35.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Database Filesystem component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Resource, Create Table, Create View, Create Procedure, Dbfs_role privilege with network access via Oracle Net to compromise Database Filesystem. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Database Filesystem. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Database Filesystem de Oracle Database Server. Las versiones compatibles que est\u00e1n afectadas son 11.2.0.4, 12.1.0.2 y 12.2.0.1. Una vulnerabilidad explotable f\u00e1cilmente permite a un atacante muy privilegiado que tenga privilegios de Resource, Create Table, Create View, Create Procedure, Dbfs_role con acceso a la red por medio de Oracle Net comprometer a Database Filesystem. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la capacidad no autorizada de causar una suspensi\u00f3n o un bloqueo repetible frecuentemente (DOS completo) de Database Filesystem. CVSS 3.1 Puntuaci\u00f3n Base 4.9 (Impactos de la Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_filesystem:11.2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3098211D-F7E6-4163-9584-4AEAED4AD627"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_filesystem:12.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "82984A11-2DF7-4FC8-AD51-6B7BCAF4B363"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_filesystem:12.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CCCAA23E-66DE-42A4-AFAF-B41C66F9E757"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}