Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-4014 (GCVE-0-2008-4014)
Vulnerability from cvelistv5 – Published: 2009-01-14 02:00 – Updated: 2024-08-07 10:00
VLAI?
EPSS
Summary
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:00:42.286Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33525",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33525"
},
{
"name": "ADV-2009-0115",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name": "1021572",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021572"
},
{
"name": "33177",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/33177"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-01-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-01-24T10:00:00.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "33525",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33525"
},
{
"name": "ADV-2009-0115",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name": "1021572",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021572"
},
{
"name": "33177",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/33177"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-4014",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33525"
},
{
"name": "ADV-2009-0115",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name": "1021572",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021572"
},
{
"name": "33177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33177"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2008-4014",
"datePublished": "2009-01-14T02:00:00.000Z",
"dateReserved": "2008-09-09T00:00:00.000Z",
"dateUpdated": "2024-08-07T10:00:42.286Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-QWH8-PVGG-FXXH
Vulnerability from github – Published: 2022-05-02 00:05 – Updated: 2022-05-02 00:05
VLAI?
Details
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
{
"affected": [],
"aliases": [
"CVE-2008-4014"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-01-14T02:30:00Z",
"severity": "MODERATE"
},
"details": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GHSA-qwh8-pvgg-fxxh",
"modified": "2022-05-02T00:05:52Z",
"published": "2022-05-02T00:05:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4014"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33525"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/33177"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1021572"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/0115"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2008-4014
Vulnerability from fkie_nvd - Published: 2009-01-14 02:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "296BCDEA-69B8-4184-928B-3E04F4F09C89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD9A13-E533-48B2-B5EB-9B7A0124D594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13AEBC-7718-4206-98EC-95E9228469C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6F28FD-6EAD-4EDD-B9A1-0B120D0F0919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4ED2EB-1E90-4E99-AAD6-5D838800F9B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "117EF4D2-3EA8-410E-8721-31C3C41A7B56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "F7969E06-9E5E-4264-B235-B0C4C1DB56D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0160E00-D722-40CE-976C-77CB91C1B94D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "982CB6A8-015D-468C-AE03-68A06AA6CB1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C0725F-D926-473E-8E74-EA3A38D47EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "99FCD0D0-5DFC-40DA-AECC-BB9ED58070C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:4.0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0B5D7D-0F8C-4AA4-B0C4-895F17F124E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:6.0.8.26_ps17:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE3F656-8A85-4A2B-92E4-3DBA70D172C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:7.0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29601BB1-9F56-4822-9CEA-A7B507C96CDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:8.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8619C62A-36D2-4AE7-A0F7-6ADAFDE02483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C09C4B72-2680-4AFB-9E0B-9B24EFF7066E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CFAE1E8A-644B-42FD-B149-89AD420BD7A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "0C57D5C2-EEFC-432B-BAF6-57984578186C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8075E330-5819-4105-9BB7-4DCC3C0EAEF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB346764-EDF2-4BE1-A273-C2CE9A173CFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E59B89D9-AAF9-40CB-931C-EB4958491B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C64888FB-133F-4930-8368-1BD2A4FB11A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "87DEB7BD-FB71-4C22-A0FF-89923B263DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BAAD1A33-4333-4AFB-8D49-1274AE345BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "852BF209-3C6F-403B-920D-50C46D37515B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "335143DB-4538-49F4-BAFB-C47802318667",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A3E2D8-617C-4740-B662-F8884CE26BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4FFBB096-523E-4634-ADC4-6CFB03F9577B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D809B0B7-70EF-47C5-B91F-923E999CA7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB37CB05-942B-460C-8F1E-2098A4B5F6AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A6834D6B-859F-4F69-ADF8-4A2BA6672869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B82E1-D1AD-46F2-8B95-117F38563FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC5FDD9-F24C-4DA2-9CE3-96522DB4A10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDECF110-F375-4A3C-8BA9-1CF69B6EF027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "77F36775-7D44-405E-8DE3-EBD71C9EE421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D94B7D50-4527-4C14-8A50-D4C0566F36BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC53C94-1C7B-4B5E-8114-EFB5ED61B045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2328BA88-C390-46EA-8C30-9F0A001C10EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.0:r2:*:*:*:*:*:*",
"matchCriteriaId": "FE7CAAFD-C15A-4124-933F-C6CCFF35BB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8F5AAE-0365-4E01-AB04-CDC6D58B00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "58B58DAF-FDF2-4A07-97E1-3CDE2A84670E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B4BAA9-D045-4D2B-8220-47F47ED936DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "A4C5E780-C03A-46DB-85A2-2471AF377206",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FFDBFF-C219-49E7-AD16-0657D6D4E8BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6C4D36-D9D1-4143-94AA-D8E08F23D2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0223F3-A9D4-4A4F-8934-761D83CD5494",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F01A3ABC-2033-47E0-A84C-62CCA67C578F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96C617ED-3D8C-4B64-A56A-30BDE6E9B8D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2_.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0D1B29-05BB-415E-ADA3-574F49D96AF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "155F0A5E-7DF2-4DA6-9ABB-97AFFE090618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3575AD-C253-4FBA-A2D8-509DABED8431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB877D9-C8BB-4A08-A953-043F7DB5BA6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B4FEFEB0-0EC5-4285-870E-3E0682673E9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8B77FF3B-B84E-4918-8688-0B25CFC61141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9D2A52-5131-4A24-A355-2DACAFFA22D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A79FF0E1-4EEF-49E2-890C-1C8937CF2F5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE059C8C-BA43-4757-8CA6-8E1B67DF8903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "70D887D7-B7FB-44DF-98DA-7FBC4EF1D910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "561EF25D-96FA-41EB-ADBE-82F22766CA6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9A3EA86-0C95-4260-8E11-ECCE161BDF5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "24080465-B313-44B6-910A-DC7F6F670899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F53D7685-95E0-4653-8D48-290E557793E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:11i:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C984F4-C649-44E1-99D5-DD565CFD7ACC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en el componente Oracle BPEL Process Manager en Oracle Application Server None permite a usuarios remotamente autentificados afectar la confidencialidad e integridad mediante vectores desconocidos."
}
],
"id": "CVE-2008-4014",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-01-14T02:30:00.267",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/33525"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securityfocus.com/bid/33177"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securitytracker.com/id?1021572"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/33177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021572"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0115"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2008-4014
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2008-4014",
"description": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GSD-2008-4014",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2008-4014"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-4014"
],
"details": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GSD-2008-4014",
"modified": "2023-12-13T01:22:59.702097Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-4014",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33525",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33525"
},
{
"name": "ADV-2009-0115",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
},
{
"name": "1021572",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021572"
},
{
"name": "33177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33177"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:7.0.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:6.0.8.26_ps17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:4.0.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:11i:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.0:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:8.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2_.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:4.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:1.0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-4014"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1021572",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1021572"
},
{
"name": "33525",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33525"
},
{
"name": "33177",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/33177"
},
{
"name": "ADV-2009-0115",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/0115"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2012-10-23T02:53Z",
"publishedDate": "2009-01-14T02:30Z"
}
}
}
CERTA-2009-AVI-013
Vulnerability from certfr_avis - Published: 2009-01-14 - Updated: 2009-01-14
Plusieurs vulnérabilités affectent les produits Oracle. Elles permettent à un utilisateur malveillant de porter atteinte à l'intégrité, à la confidentialité ou à la disponibilité des données.
Description
- Huit vulnérabilités, exploitables à distance après authentification, affectent les bases de données (Oracle Database). Elles permettent de porter atteinte à l'intégrité, à la confidentialité ou à la disponibilité des données ;
- deux vulnérabilités affectent les clients SQL*Plus et permettent de porter atteinte à la confidentialité des données ;
- neuf vulnérabilités, exploitables à distance sans authentification, concernent Oracle Secure Backup. Quatre d'entre elles ne permettent qu'un déni de service. Les autres portent en plus atteinte à l'intégrité et à la confidentialité des données ;
- une vulnérabilité affecte la base de données résidente en mémoire, Oracle TimesTen In-Memory Database. Elle permet de porter atteinte à l'intégrité, à la confidentialité et à la disponibilité des données ;
- quatre vulnérabilités, dont trois sont exploitables sans authentification, affectent Oracle Application Server. Elles permettent de porter atteinte à la confidentialité ou à l'intégrité des données. Trois d'entre elles sont exploitables à distance ;
- une vulnérabilité de Oracle Collaboration Suite permet, à distance, à un utilisateur authentifié de lire indûment des données ;
- quatre vulnérabilités, dont une est exploitable sans authentification, sont présentes dans Oracle E-business Suite. Elles permettent de porter atteinte à la confidentialité ou à l'intégrité des données. Trois d'entre elles sont exploitables à distance ;
- une vulnérabilité concerne Oracle Enterprise Manager Grid Control. Elle permet à un utilisateur authentifié d'accéder à distance à des données ;
- cinq vulnérabilités sont présentes dans PeopleSoft. Elles permettent à un utilisateur authentifié de porter atteinte, à distance, à l'intégrité, à la confidentialité ou à la disponibilité des données ;
- une vulnérabilité de JD Edwards Tools permet à un utilisateur authentifié de lire indûment des données, à distance ;
- quatre vulnérabilités, exploitables à distance et sans authentification, affectent Oracle WebLogic Server. Elles permettent de porter atteinte à la confidentialité ou à l'intégrité des données.
- une vulnérabilité, exploitable à distance et sans authentification, affecte Oracle WebLogic Portal. Elle permet de porter atteinte à la confidentialité et à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g ; | ||
| Oracle | N/A | Oracle Application Server 10g ; | ||
| Oracle | N/A | Oracle E-business Suite 11i et 12 ; | ||
| Oracle | PeopleSoft | Peoplesoft Enterprise HRMS ; | ||
| Oracle | N/A | Client Oracle SQL*Plus ; | ||
| Oracle | Weblogic | Oracle WebLogic Server, versions 7.x à 10. x ; | ||
| Oracle | N/A | Oracle Database 9i, 10g et 11g ; | ||
| Oracle | N/A | Oracle Secure Backup version 10.x ; | ||
| Oracle | N/A | JD Edwards Tools ; | ||
| Oracle | N/A | Oracle TimesTen In-Memory Database version 7.x ; | ||
| Oracle | Weblogic | Oracle WebLogic Portal, versions 8.x à 10. x. | ||
| Oracle | N/A | Oracle Collaboration Suite 10g ; |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Enterprise Manager Grid Control 10g ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-business Suite 11i et 12 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Peoplesoft Enterprise HRMS ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Client Oracle SQL*Plus ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server, versions 7.x \u00e0 10. x ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i, 10g et 11g ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Secure Backup version 10.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "JD Edwards Tools ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle TimesTen In-Memory Database version 7.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Portal, versions 8.x \u00e0 10. x.",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Collaboration Suite 10g ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\n- Huit vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance apr\u00e8s authentification,\n affectent les bases de donn\u00e9es (Oracle Database). Elles permettent\n de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 ou \u00e0 la\n disponibilit\u00e9 des donn\u00e9es ;\n- deux vuln\u00e9rabilit\u00e9s affectent les clients SQL\\*Plus et permettent de\n porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es ;\n- neuf vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance sans authentification,\n concernent Oracle Secure Backup. Quatre d\u0027entre elles ne permettent\n qu\u0027un d\u00e9ni de service. Les autres portent en plus atteinte \u00e0\n l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9 des donn\u00e9es ;\n- une vuln\u00e9rabilit\u00e9 affecte la base de donn\u00e9es r\u00e9sidente en m\u00e9moire,\n Oracle TimesTen In-Memory Database. Elle permet de porter atteinte \u00e0\n l\u0027int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 et \u00e0 la disponibilit\u00e9 des donn\u00e9es\n ;\n- quatre vuln\u00e9rabilit\u00e9s, dont trois sont exploitables sans\n authentification, affectent Oracle Application Server. Elles\n permettent de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l\u0027int\u00e9grit\u00e9\n des donn\u00e9es. Trois d\u0027entre elles sont exploitables \u00e0 distance ;\n- une vuln\u00e9rabilit\u00e9 de Oracle Collaboration Suite permet, \u00e0 distance,\n \u00e0 un utilisateur authentifi\u00e9 de lire ind\u00fbment des donn\u00e9es ;\n- quatre vuln\u00e9rabilit\u00e9s, dont une est exploitable sans\n authentification, sont pr\u00e9sentes dans Oracle E-business Suite. Elles\n permettent de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l\u0027int\u00e9grit\u00e9\n des donn\u00e9es. Trois d\u0027entre elles sont exploitables \u00e0 distance ;\n- une vuln\u00e9rabilit\u00e9 concerne Oracle Enterprise Manager Grid Control.\n Elle permet \u00e0 un utilisateur authentifi\u00e9 d\u0027acc\u00e9der \u00e0 distance \u00e0 des\n donn\u00e9es ;\n- cinq vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans PeopleSoft. Elles permettent\n \u00e0 un utilisateur authentifi\u00e9 de porter atteinte, \u00e0 distance, \u00e0\n l\u0027int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 ou \u00e0 la disponibilit\u00e9 des donn\u00e9es\n ;\n- une vuln\u00e9rabilit\u00e9 de JD Edwards Tools permet \u00e0 un utilisateur\n authentifi\u00e9 de lire ind\u00fbment des donn\u00e9es, \u00e0 distance ;\n- quatre vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance et sans\n authentification, affectent Oracle WebLogic Server. Elles permettent\n de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l\u0027int\u00e9grit\u00e9 des\n donn\u00e9es.\n- une vuln\u00e9rabilit\u00e9, exploitable \u00e0 distance et sans authentification,\n affecte Oracle WebLogic Portal. Elle permet de porter atteinte \u00e0 la\n confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3999"
},
{
"name": "CVE-2008-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4015"
},
{
"name": "CVE-2008-5445",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5445"
},
{
"name": "CVE-2008-5459",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5459"
},
{
"name": "CVE-2008-4014",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4014"
},
{
"name": "CVE-2008-5460",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5460"
},
{
"name": "CVE-2008-4007",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4007"
},
{
"name": "CVE-2008-5457",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5457"
},
{
"name": "CVE-2008-5454",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5454"
},
{
"name": "CVE-2008-5458",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5458"
},
{
"name": "CVE-2008-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2623"
},
{
"name": "CVE-2008-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5436"
},
{
"name": "CVE-2008-5451",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5451"
},
{
"name": "CVE-2008-5438",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5438"
},
{
"name": "CVE-2008-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5443"
},
{
"name": "CVE-2008-5442",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5442"
},
{
"name": "CVE-2008-3981",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3981"
},
{
"name": "CVE-2008-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3978"
},
{
"name": "CVE-2008-5437",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5437"
},
{
"name": "CVE-2008-5455",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5455"
},
{
"name": "CVE-2008-5439",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5439"
},
{
"name": "CVE-2008-5444",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5444"
},
{
"name": "CVE-2008-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4016"
},
{
"name": "CVE-2008-5447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5447"
},
{
"name": "CVE-2008-5463",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5463"
},
{
"name": "CVE-2008-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3974"
},
{
"name": "CVE-2008-5450",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5450"
},
{
"name": "CVE-2008-5446",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5446"
},
{
"name": "CVE-2008-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3997"
},
{
"name": "CVE-2008-5462",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5462"
},
{
"name": "CVE-2008-5440",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5440"
},
{
"name": "CVE-2008-3979",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3979"
},
{
"name": "CVE-2008-5456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5456"
},
{
"name": "CVE-2008-4006",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4006"
},
{
"name": "CVE-2008-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3973"
},
{
"name": "CVE-2008-5452",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5452"
},
{
"name": "CVE-2008-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5461"
},
{
"name": "CVE-2008-5448",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5448"
},
{
"name": "CVE-2008-4017",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4017"
},
{
"name": "CVE-2008-5449",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5449"
},
{
"name": "CVE-2008-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5441"
}
],
"initial_release_date": "2009-01-14T00:00:00",
"last_revision_date": "2009-01-14T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-013",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent les produits Oracle. Elles permettent\n\u00e0 un utilisateur malveillant de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9, \u00e0 la\nconfidentialit\u00e9 ou \u00e0 la disponibilit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9s des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 13 janvier 2009",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…