FKIE_CVE-2007-3854
Vulnerability from fkie_nvd - Published: 2007-07-18 19:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18E9031D-19DD-4E6D-BDB4-0EC93DB6C8CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:apex:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "574D3EEB-E1D4-4DB3-93D3-0410747EC8BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:apex:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2D813027-4F66-4CFB-A3C4-F5A302B0D9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:apex:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95351E3F-5B5C-48F1-9137-2CCCE11775AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "F7969E06-9E5E-4264-B235-B0C4C1DB56D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA9867F-D7BC-4230-9584-C2FBB6642482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8F5AAE-0365-4E01-AB04-CDC6D58B00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B4BAA9-D045-4D2B-8220-47F47ED936DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6C4D36-D9D1-4143-94AA-D8E08F23D2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F01A3ABC-2033-47E0-A84C-62CCA67C578F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB877D9-C8BB-4A08-A953-043F7DB5BA6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8B77FF3B-B84E-4918-8688-0B25CFC61141",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9D2A52-5131-4A24-A355-2DACAFFA22D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE059C8C-BA43-4757-8CA6-8E1B67DF8903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF7ABE6-0AFB-4A74-A533-2D390991A6CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*",
"matchCriteriaId": "D86DC2E3-3B89-4FAC-9B8F-DC629B50ADC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "FE7180CD-675E-4311-AE7A-6098EE241965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8:r2:*:*:*:*:*:*",
"matchCriteriaId": "B2E404AB-7F54-48D5-BFA5-8D08BB3FC6C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.8dv:r2:*:*:*:*:*:*",
"matchCriteriaId": "04E72F3A-E839-4CFF-9CB7-1E1FC6F8C8E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "03A522A3-07D7-481F-A538-EA3D13256F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "26BFEEFD-C652-46A2-A9E7-36210482DD48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:database_server:10.2.0.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "A14DD3F3-2CC4-492A-9C78-9B3C39D7AD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D07FEA4F-B1C7-4250-81FD-AC1289769348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78408427-3FFB-45C4-82EF-C8D636B3A718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B1BE09-4A96-41A3-AA1D-74533F396998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80B61990-9CC2-4215-9879-AC817F4E6767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0CBDB5-B13D-4071-994A-E1318A3821DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:e-business_suite:12.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "610AE265-C18D-4895-8034-5DB331DC68DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA79502-9191-422F-8F45-6CA1B95E1A04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EDD576-D9BE-4478-84FE-833F89930A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D36815-CB02-4F65-988A-1F8B677D2F0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA3A737-0989-478B-BAA6-8DC84E937E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.22:*:*:*:*:*:*:*",
"matchCriteriaId": "31D3B59F-EBAE-410A-9370-BD12956C11B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.47:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2CF929-6203-436A-AAEB-6E2142B2B1F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.48:*:*:*:*:*:*:*",
"matchCriteriaId": "7C098860-0862-4C5B-8EE4-9469D5D01815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*",
"matchCriteriaId": "445508AC-3316-459F-98C1-8310EF327E8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "74835B56-8009-4688-99DC-E6CAD3BEEFD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:secure_enterprise_search:10.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "184FC430-F68B-4390-90C7-421F968425ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en Oracle Database versiones 9.0.1.5+, 9.2.0.7 y 10.1.0.5, permiten a usuarios autenticados remotoss tener un impacto desconocido por medio de (1) SYS.DBMS_PRVTAQIS en el componente Advanced Queuing (DB02) y (2) MDSYS.MD en el componente Spatial (DB12). NOTA: Oracle no ha cuestionado las afirmaciones de investigadores confiables de que DB02 es para una inyecci\u00f3n SQL y DB12 para un desbordamiento de b\u00fafer."
}
],
"id": "CVE-2007-3854",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-18T19:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26114"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26166"
},
{
"source": "cve@mitre.org",
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
},
{
"source": "cve@mitre.org",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018415"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2562"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2635"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00727143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-200A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35490"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35497"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…