var-200904-0431
Vulnerability from variot
Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is for multiple integer overflows in a function that parses an optional data stream within a Microsoft Office file, leading to a heap-based buffer overflow. Oracle has released the April 2009 critical patch update that addresses 43 vulnerabilities affecting the following software: Oracle Database Oracle Audit Vault Oracle Application Server Oracle Outside In SDK HTML Export Oracle XML Publisher Oracle BI Publisher Oracle E-Business Suite PeopleSoft Enterprise PeopleTools PeopleSoft Enterprise HRMS Oracle WebLogic Server (formerly BEA WebLogic Server) Oracle Data Service Integrator Oracle AquaLogic Data Services Platform Oracle JRockit. Oracle Outside In is prone to multiple buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied input. An attacker can exploit these issue by tricking a victim into opening a specially crafted file with an application using the affected library. Successful exploits will allow arbitrary code to run in the context of the user running the affected application. NOTE: These issues were previously covered in BID 34461 (Oracle April 2009 Critical Patch Update Multiple Vulnerabilities), but have been given their own record to better document them. ----------------------------------------------------------------------
Are you missing:
SECUNIA ADVISORY ID:
Critical:
Impact:
Where:
within the advisory below?
This is now part of the Secunia commercial solutions.
For more information see vulnerability #6 through #9 in: SA34693
SOLUTION: The vendor recommends to delete the GdFileConv.exe file. See vendor's advisory for additional details.
I. The document provides information about affected components, access and authorization required for successful exploitation, and the impact from the vulnerabilities on data confidentiality, integrity, and availability. If significant additional details about vulnerabilities and remediation techniques become available, we will update the Vulnerability Notes Database. Impact
The impact of these vulnerabilities varies depending on the product, component, and configuration of the system. Potential consequences include the execution of arbitrary code or commands, information disclosure, and denial of service. Vulnerable components may be available to unauthenticated, remote attackers. An attacker who compromises an Oracle database may be able to access sensitive information. Note that this document only lists newly corrected issues. Updates to patches for previously known issues are not listed. Please send email to cert@cert.org with "TA09-105A Feedback VU#955892" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2009 by US-CERT, a government organization. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
iDefense Security Advisory 05.14.09 http://labs.idefense.com/intelligence/vulnerabilities/ May 14, 2009
I. BACKGROUND
Oracle Corp.'s Outside In Technology is a document conversion engine supporting a large number of binary file formats. Prior to Oracle's acquisition, the software was maintained by Stellent Inc. The software appears to have originated from "QuickView" for Windows 98, but later spun off. It is used by various software packages, one of which is Motorola Inc.'s Good Mobile Messaging Server. For more information, visit the vendors' sites at the URLs provided below.
http://www.oracle.com/technology/products/content-management/oit/oit_all.html
http://www.good.com/corp/index.php
II. DESCRIPTION
Remote exploitation of multiple integer overflow vulnerabilities in Oracle Corp.'s Outside In Technology, as included in various vendors' software distributions, allows attacker to execute arbitrary code.
These vulnerabilities exist in the handling of an optional data stream stored within various files. Both issues are integer overflows, and are within the same function.
Within the vulnerable function, an integer value is read from the Microsoft Office file. This value is later used in several arithmetic integer calculations. Since no validation is performed, integer overflows can occur. The result is the allocation of a buffer that is too small to hold the data that is subsequently read from the file. A heap buffer overflow occurs, leading to an exploitable condition.
III. ANALYSIS
Exploitation of these vulnerabilities allows attackers to execute arbitrary code. In order to exploit these vulnerabilities, the attacker must somehow supply a malformed document to an application that will process the document with Outside In Technology. Likewise, the privileges gained will also depend on the software using the library.
In the case of Good Mobile Messaging Server, an attacker can send an electronic mail message with a specially crafted Office document attachment to a user. When the user chooses to view the document, the vulnerable condition will be triggered. Upon successful exploitation, the attacker will gain the privileges of the "GoodAdmin" user. This is a special user account which, in some configurations, may be a member of the "Administrator" group. Regardless of the user's "Administrator" status, the user will always have full privileges to "Read" and "Send As" all users on the Microsoft Exchange server. This could allow an attacker to conduct further social engineering attacks.
Other software packages using Outside In were not investigated.
IV. DETECTION
iDefense confirmed the existence of these vulnerabilities using the follow versions of Outside In on Windows Server 2003. Multiple modules were confirmed to contain the vulnerable code; vsmpp, vspp97, vsvisio, vsw6, vsw97, vsxl5. Other modules may also be affected.
8.1.5.4282 8.1.9.4417 8.2.2.4866 8.3.0.5129
Additionally the following versions of Good Mobile Messaging Server for Exchange ship with vulnerable versions of the affected modules.
4.9.3.41 5.0.4.28 6.0.0.106
All versions of Outside In, including versions for operating systems other than Windows, are assumed to be vulnerable. Additionally, all software that includes or uses Outside In is assumed to be vulnerable. Earlier versions, including those branded with other names, are vulnerable as well.
V. WORKAROUND
In order to prevent exploitation of this vulnerability, iDefense recommends using file system access control lists (ACLs) to prevent reading the affected modules.
For Good Mobile Messaging Server, Good Software recommends deleting the GdFileConv.exe file and restarting the Messaging Server.
VI. VENDOR RESPONSE
Oracle has released a patch which addresses this issue. For more information, consult their advisory at the following URL:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html
Good Technology has released a patch which addresses this issue. For more information, consult their advisory at the following URL:
http://www.good.com/faq/18431.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-1011 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
01/30/2009 - GoodLink contact identified 01/30/2009 - Security contact research begins 02/05/2009 - Oracle contact identified 02/09/2009 - Initial Oracle Reply 02/09/2009 - Initial Vendor Notification 02/10/2009 - Initial GoodLink Reply 02/11/2009 - Oracle validation 02/16/2009 - GoodLink customer alert sent 02/16/2009 - GoodLink validation 02/19/2009 - Oracle requests PoC 02/19/2009 - PoC sent to Oracle 02/25/2009 - GoodLink status update 02/27/2009 - Oracle status update 03/06/2009 - GoodLink status update 04/14/2009 - Oracle patch released 05/13/2009 - CVE Corelation requested from Oracle 05/14/2009 - Coordinated Public Disclosure 05/14/2009 - GoodLink ready for disclosure coordinated with iDefense
IX. CREDIT
This vulnerability was discovered by Joshua J. Drake, iDefense Labs.
Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2009 iDefense, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFKDci2bjs6HoxIfBkRAgoMAJ9LZYN8mlXP7dHp866JUjOllL/2igCfYTU/ xIe37mYPMzb4hra6BAUZrn8= =az7z -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ----------------------------------------------------------------------
Secunia is pleased to announce the release of the annual Secunia report for 2008. Some have unknown impacts, others can be exploited by malicious users to conduct SQL injection attacks or disclose sensitive information, and by malicious people compromise a vulnerable system.
1) A format string error exists within the Oracle Process Manager and Notification (opmn) daemon, which can be exploited to execute arbitrary code via a specially crafted POST request to port 6000/TCP.
2) Input passed to the "DBMS_AQIN" package is not properly sanitised before being used. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
3) An error in the Application Express component included in Oracle Database can be exploited by unprivileged database users to disclose APEX password hashes in "LOWS_030000.WWV_FLOW_USER".
The remaining vulnerabilities are caused due to unspecified errors.
PROVIDED AND/OR DISCOVERED BY: 1) Joxean Koret of TippingPoint 2, 3) Alexander Kornbrust of Red Database Security
The vendor also credits: * Joshua J. * Esteban Martinez Fayo of Application Security, Inc. * Franz Huell of Red Database Security; * Mike Janowski of Neohapsis, Inc. * Joxean Koret * David Litchfield of NGS Software * Tanel Poder * Sven Vetter of Trivadis * Dennis Yurichev
ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html
ZDI: http://www.zerodayinitiative.com/advisories/ZDI-09-017/
Red Database Security: http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html http://www.red-database-security.com/advisory/apex_password_hashes.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200904-0431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application server", "scope": "eq", "trust": 2.4, "vendor": "oracle", "version": "8.2.2" }, { "model": "application server", "scope": "eq", "trust": 2.4, "vendor": "oracle", "version": "8.3.0" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.0.1" }, { "model": "websphere portal", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "6.0.0" }, { "model": "websphere portal", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "6.1.5" }, { "model": "websphere portal", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "6.1.0" }, { "model": "websphere portal", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "8" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1.5.3 cf27" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0.0.2 cf25" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.0.0.1 cf08" }, { "model": "websphere portal", "scope": "lt", "trust": 0.8, "vendor": "ibm", "version": "7" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1.0.6 cf27" }, { "model": "websphere portal", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.0.0.1" }, { "model": "outside in sdk html export", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "8.3" }, { "model": "outside in sdk html export", "scope": "eq", "trust": 0.6, "vendor": "oracle", "version": "8.2.2" }, { "model": "jrockit r27.1.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "xml publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.6.2" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.01" }, { "model": "systems weblogic portal sp1", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "oracle9i personal edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.49" }, { "model": "oracle11g standard edition one", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.16" }, { "model": "data service integrator", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3" }, { "model": "bi publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.3.3" }, { "model": "xml publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.2.1" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2.3.0" }, { "model": "aqualogic data services platform", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0" }, { "model": "oracle9i enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.06" }, { "model": "aqualogic data services platform", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0.1" }, { "model": "systems weblogic portal sp6", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "xml publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.2" }, { "model": "oracle11g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.16" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.11" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.13" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.04" }, { "model": "oracle11g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.0.7" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.1" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "10.0" }, { "model": "jrockit r27.6.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.07" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "systems weblogic portal sp2", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "systems weblogic portal sp5", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g application server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "10.3" }, { "model": "systems weblogic portal sp3", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "systems weblogic portal", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "bi publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.3.1" }, { "model": "systems weblogic server maintenance pack", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "oracle9i standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.13" }, { "model": "oracle9i standard edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "oracle10g enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "oracle9i enterprise edition .8dv", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2" }, { "model": "oracle10g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.5" }, { "model": "bi publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.3.0" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.1" }, { "model": "peoplesoft enterprise hrms", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0" }, { "model": "bi publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.3.2" }, { "model": "e-business suite 11i", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.5.10.2" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.12" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.15" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.05" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.16" }, { "model": "systems weblogic server mp1", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "10.0" }, { "model": "peoplesoft enterprise hrms", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.9" }, { "model": "audit vault", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.3" }, { "model": "jrockit r27.6.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.02" }, { "model": "systems weblogic portal sp4", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.1" }, { "model": "bi publisher", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.1.3.4" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.14" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "8.12" }, { "model": "weblogic server", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.3" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.11" }, { "model": "e-business suite", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.0.6" }, { "model": "oracle10g personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.2.0.4" }, { "model": "oracle9i personal edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.2.8" }, { "model": "oracle11g standard edition", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.16" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0.0.14" }, { "model": "systems weblogic server sp", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.03" }, { "model": "systems weblogic server sp7", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "7.0" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.2" }, { "model": "aqualogic data services platform", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "systems weblogic server", "scope": "eq", "trust": 0.3, "vendor": "bea", "version": "9.0" }, { "model": "outside in", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.3.0.5129" }, { "model": "outside in", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.2.2.4866" }, { "model": "outside in", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.9.4417" }, { "model": "outside in", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "8.1.5.4282" }, { "model": "mobile messaging server for exchange", "scope": "eq", "trust": 0.3, "vendor": "good", "version": "6.0.0.106" }, { "model": "mobile messaging server for exchange", "scope": "eq", "trust": 0.3, "vendor": "good", "version": "5.0.4.28" }, { "model": "mobile messaging server for exchange", "scope": "eq", "trust": 0.3, "vendor": "good", "version": "4.9.3.41" } ], "sources": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" }, { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:application_server:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:application_server:8.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-1011" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Esteban Martinez Fayo Joxean Koret joxeankoret@yahoo.es", "sources": [ { "db": "CNNVD", "id": "CNNVD-200904-328" } ], "trust": 0.6 }, "cve": "CVE-2009-1011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2009-1011", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-1011", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200904-328", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is for multiple integer overflows in a function that parses an optional data stream within a Microsoft Office file, leading to a heap-based buffer overflow. Oracle has released the April 2009 critical patch update that addresses 43 vulnerabilities affecting the following software:\nOracle Database\nOracle Audit Vault\nOracle Application Server\nOracle Outside In SDK HTML Export\nOracle XML Publisher\nOracle BI Publisher\nOracle E-Business Suite\nPeopleSoft Enterprise PeopleTools\nPeopleSoft Enterprise HRMS\nOracle WebLogic Server (formerly BEA WebLogic Server)\nOracle Data Service Integrator\nOracle AquaLogic Data Services Platform\nOracle JRockit. Oracle Outside In is prone to multiple buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied input. \nAn attacker can exploit these issue by tricking a victim into opening a specially crafted file with an application using the affected library. Successful exploits will allow arbitrary code to run in the context of the user running the affected application. \nNOTE: These issues were previously covered in BID 34461 (Oracle April 2009 Critical Patch Update Multiple Vulnerabilities), but have been given their own record to better document them. ----------------------------------------------------------------------\n\nAre you missing:\n\nSECUNIA ADVISORY ID:\n\nCritical:\n\nImpact:\n\nWhere:\n\nwithin the advisory below?\n\nThis is now part of the Secunia commercial solutions. \n\nFor more information see vulnerability #6 through #9 in:\nSA34693\n\nSOLUTION:\nThe vendor recommends to delete the GdFileConv.exe file. See vendor\u0027s\nadvisory for additional details. \n\n\nI. The\n document provides information about affected components, access and\n authorization required for successful exploitation, and the impact\n from the vulnerabilities on data confidentiality, integrity, and\n availability. If significant additional\n details about vulnerabilities and remediation techniques become\n available, we will update the Vulnerability Notes Database. Impact\n\n The impact of these vulnerabilities varies depending on the\n product, component, and configuration of the system. Potential\n consequences include the execution of arbitrary code or commands,\n information disclosure, and denial of service. Vulnerable\n components may be available to unauthenticated, remote attackers. \n An attacker who compromises an Oracle database may be able to\n access sensitive information. Note that this\n document only lists newly corrected issues. Updates to patches for\n previously known issues are not listed. Please send\n email to \u003ccert@cert.org\u003e with \"TA09-105A Feedback VU#955892\" in\n the subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2009 by US-CERT, a government organization. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\niDefense Security Advisory 05.14.09\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nMay 14, 2009\n\nI. BACKGROUND\n\nOracle Corp.\u0027s Outside In Technology is a document conversion engine\nsupporting a large number of binary file formats. Prior to Oracle\u0027s\nacquisition, the software was maintained by Stellent Inc. The software\nappears to have originated from \"QuickView\" for Windows 98, but later\nspun off. It is used by various software packages, one of which is\nMotorola Inc.\u0027s Good Mobile Messaging Server. For more information,\nvisit the vendors\u0027 sites at the URLs provided below. \n\nhttp://www.oracle.com/technology/products/content-management/oit/oit_all.html\n\nhttp://www.good.com/corp/index.php\n\nII. DESCRIPTION\n\nRemote exploitation of multiple integer overflow vulnerabilities in\nOracle Corp.\u0027s Outside In Technology, as included in various vendors\u0027\nsoftware distributions, allows attacker to execute arbitrary code. \n\nThese vulnerabilities exist in the handling of an optional data stream\nstored within various files. Both issues are integer overflows, and are\nwithin the same function. \n\nWithin the vulnerable function, an integer value is read from the\nMicrosoft Office file. This value is later used in several arithmetic\ninteger calculations. Since no validation is performed, integer\noverflows can occur. The result is the allocation of a buffer that is\ntoo small to hold the data that is subsequently read from the file. A\nheap buffer overflow occurs, leading to an exploitable condition. \n\nIII. ANALYSIS\n\nExploitation of these vulnerabilities allows attackers to execute\narbitrary code. In order to exploit these vulnerabilities, the attacker\nmust somehow supply a malformed document to an application that will\nprocess the document with Outside In Technology. Likewise, the\nprivileges gained will also depend on the software using the library. \n\nIn the case of Good Mobile Messaging Server, an attacker can send an\nelectronic mail message with a specially crafted Office document\nattachment to a user. When the user chooses to view the document, the\nvulnerable condition will be triggered. Upon successful exploitation,\nthe attacker will gain the privileges of the \"GoodAdmin\" user. This is\na special user account which, in some configurations, may be a member\nof the \"Administrator\" group. Regardless of the user\u0027s \"Administrator\"\nstatus, the user will always have full privileges to \"Read\" and \"Send\nAs\" all users on the Microsoft Exchange server. This could allow an\nattacker to conduct further social engineering attacks. \n\nOther software packages using Outside In were not investigated. \n\nIV. DETECTION\n\niDefense confirmed the existence of these vulnerabilities using the\nfollow versions of Outside In on Windows Server 2003. Multiple modules\nwere confirmed to contain the vulnerable code; vsmpp, vspp97, vsvisio,\nvsw6, vsw97, vsxl5. Other modules may also be affected. \n\n 8.1.5.4282\n 8.1.9.4417\n 8.2.2.4866\n 8.3.0.5129\n\nAdditionally the following versions of Good Mobile Messaging Server for\nExchange ship with vulnerable versions of the affected modules. \n\n 4.9.3.41\n 5.0.4.28\n 6.0.0.106\n\nAll versions of Outside In, including versions for operating systems\nother than Windows, are assumed to be vulnerable. Additionally, all\nsoftware that includes or uses Outside In is assumed to be vulnerable. \nEarlier versions, including those branded with other names, are\nvulnerable as well. \n\nV. WORKAROUND\n\nIn order to prevent exploitation of this vulnerability, iDefense\nrecommends using file system access control lists (ACLs) to prevent\nreading the affected modules. \n\nFor Good Mobile Messaging Server, Good Software recommends deleting the\nGdFileConv.exe file and restarting the Messaging Server. \n\nVI. VENDOR RESPONSE\n\nOracle has released a patch which addresses this issue. For more\ninformation, consult their advisory at the following URL:\n\nhttp://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html\n\nGood Technology has released a patch which addresses this issue. For\nmore information, consult their advisory at the following URL:\n\nhttp://www.good.com/faq/18431.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2009-1011 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n01/30/2009 - GoodLink contact identified\n01/30/2009 - Security contact research begins\n02/05/2009 - Oracle contact identified\n02/09/2009 - Initial Oracle Reply\n02/09/2009 - Initial Vendor Notification\n02/10/2009 - Initial GoodLink Reply\n02/11/2009 - Oracle validation\n02/16/2009 - GoodLink customer alert sent\n02/16/2009 - GoodLink validation\n02/19/2009 - Oracle requests PoC\n02/19/2009 - PoC sent to Oracle\n02/25/2009 - GoodLink status update\n02/27/2009 - Oracle status update\n03/06/2009 - GoodLink status update\n04/14/2009 - Oracle patch released\n05/13/2009 - CVE Corelation requested from Oracle\n05/14/2009 - Coordinated Public Disclosure\n05/14/2009 - GoodLink ready for disclosure coordinated with iDefense\n\nIX. CREDIT\n\nThis vulnerability was discovered by Joshua J. Drake, iDefense Labs. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2009 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (MingW32)\nComment: Using GnuPG with Mozilla - http://enigmail.mozdev.org\n\niD8DBQFKDci2bjs6HoxIfBkRAgoMAJ9LZYN8mlXP7dHp866JUjOllL/2igCfYTU/\nxIe37mYPMzb4hra6BAUZrn8=\n=az7z\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \nSome have unknown impacts, others can be exploited by malicious users\nto conduct SQL injection attacks or disclose sensitive information,\nand by malicious people compromise a vulnerable system. \n\n1) A format string error exists within the Oracle Process Manager and\nNotification (opmn) daemon, which can be exploited to execute\narbitrary code via a specially crafted POST request to port\n6000/TCP. \n\n2) Input passed to the \"DBMS_AQIN\" package is not properly sanitised\nbefore being used. This can be exploited to manipulate SQL queries by\ninjecting arbitrary SQL code. \n\n3) An error in the Application Express component included in Oracle\nDatabase can be exploited by unprivileged database users to disclose\nAPEX password hashes in \"LOWS_030000.WWV_FLOW_USER\". \n\nThe remaining vulnerabilities are caused due to unspecified errors. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Joxean Koret of TippingPoint\n2, 3) Alexander Kornbrust of Red Database Security\n\nThe vendor also credits:\n* Joshua J. \n* Esteban Martinez Fayo of Application Security, Inc. \n* Franz Huell of Red Database Security;\n* Mike Janowski of Neohapsis, Inc. \n* Joxean Koret\n* David Litchfield of NGS Software\n* Tanel Poder\n* Sven Vetter of Trivadis\n* Dennis Yurichev\n\nORIGINAL ADVISORY:\nOracle:\nhttp://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html\n\nZDI:\nhttp://www.zerodayinitiative.com/advisories/ZDI-09-017/\n\nRed Database Security:\nhttp://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html\nhttp://www.red-database-security.com/advisory/apex_password_hashes.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" }, { "db": "PACKETSTORM", "id": "77574" }, { "db": "PACKETSTORM", "id": "76710" }, { "db": "PACKETSTORM", "id": "77564" }, { "db": "PACKETSTORM", "id": "76704" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-1011", "trust": 3.1 }, { "db": "SECUNIA", "id": "34693", "trust": 2.6 }, { "db": "USCERT", "id": "TA09-105A", "trust": 2.5 }, { "db": "OSVDB", "id": "53750", "trust": 2.4 }, { "db": "SECTRACK", "id": "1022055", "trust": 2.4 }, { "db": "BID", "id": "34461", "trust": 1.3 }, { "db": "VUPEN", "id": "ADV-2009-1042", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2009-001241", "trust": 0.8 }, { "db": "CERT/CC", "id": "TA09-105A", "trust": 0.6 }, { "db": "IDEFENSE", "id": "20090515 MULTIPLE VENDOR OUTSIDE IN MULTIPLE INTEGER OVERFLOW VULNERABILITIES", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200904-328", "trust": 0.6 }, { "db": "ZDI", "id": "ZDI-09-017", "trust": 0.4 }, { "db": "BID", "id": "34994", "trust": 0.3 }, { "db": "SECUNIA", "id": "35135", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "77574", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "76710", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "77564", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "76704", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" }, { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "PACKETSTORM", "id": "77574" }, { "db": "PACKETSTORM", "id": "76710" }, { "db": "PACKETSTORM", "id": "77564" }, { "db": "PACKETSTORM", "id": "76704" }, { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "id": "VAR-200904-0431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.065972224 }, "last_update_date": "2023-12-18T11:13:58.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cpuapr2009", "trust": 0.8, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html" }, { "title": "1660640", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640" }, { "title": "1660774", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660774" }, { "title": "090417_86", "trust": 0.8, "url": "http://www.oracle.com/technology/global/jp/security/090417_86/top.html" }, { "title": "TA09-105A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta09-105a.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001241" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2009-1011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://osvdb.org/53750" }, { "trust": 2.4, "url": "http://secunia.com/advisories/34693" }, { "trust": 2.4, "url": "http://www.securitytracker.com/id?1022055" }, { "trust": 2.4, "url": "http://www.us-cert.gov/cas/techalerts/ta09-105a.html" }, { "trust": 2.0, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html" }, { "trust": 2.0, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=798" }, { "trust": 1.0, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/34461" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1011" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta09-105a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/jvntr-2009-11/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1011" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2009/1042" }, { "trust": 0.6, "url": "http://www.oracle.com" }, { "trust": 0.5, "url": "http://www.good.com/faq/18431.html" }, { "trust": 0.4, "url": "http://www.zerodayinitiative.com/advisories/zdi-09-017/" }, { "trust": 0.4, "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html" }, { "trust": 0.4, "url": "http://www.red-database-security.com/advisory/apex_password_hashes.html" }, { "trust": 0.4, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=801" }, { "trust": 0.4, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=800" }, { "trust": 0.4, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=799" }, { "trust": 0.3, "url": "http://secunia.com/secunia_research/2009-23/" }, { "trust": 0.3, "url": "http://secunia.com/secunia_research/2009-22/" }, { "trust": 0.3, "url": "http://www.appsecinc.com/resources/alerts/oracle/2009-03.shtml" }, { "trust": 0.3, "url": "/archive/1/502845" }, { "trust": 0.3, "url": "/archive/1/502707" }, { "trust": 0.3, "url": "/archive/1/502697" }, { "trust": 0.3, "url": "/archive/1/502727" }, { "trust": 0.3, "url": "/archive/1/502723" }, { "trust": 0.3, "url": "/archive/1/506160" }, { "trust": 0.3, "url": "/archive/1/502724" }, { "trust": 0.3, "url": "/archive/1/502683" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1001.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1002.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1003.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1004.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1005.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1006.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1012.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technology/deploy/security/wls-security/1016.html" }, { "trust": 0.3, "url": "http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html" }, { "trust": 0.3, "url": "/archive/1/503487" }, { "trust": 0.3, "url": "/archive/1/503622" }, { "trust": 0.3, "url": "/archive/1/503625" }, { "trust": 0.3, "url": "/archive/1/503624" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/34693/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/35135/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta09-105a.html\u003e" }, { "trust": 0.1, "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html\u003e" }, { "trust": 0.1, "url": "http://www.oracle.com/technology/deploy/security/alerts.htm\u003e" }, { "trust": 0.1, "url": "http://www.oracle.com/technology/deploy/security/pdf/public_vuln_to_advisory_mapping.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://www.good.com/corp/index.php" }, { "trust": 0.1, "url": "http://enigmail.mozdev.org" }, { "trust": 0.1, "url": "http://cve.mitre.org/)," }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/" }, { "trust": 0.1, "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php" }, { "trust": 0.1, "url": "http://www.oracle.com/technology/products/content-management/oit/oit_all.html" }, { "trust": 0.1, "url": "http://labs.idefense.com/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1011" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/request_2008_report/" } ], "sources": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" }, { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "PACKETSTORM", "id": "77574" }, { "db": "PACKETSTORM", "id": "76710" }, { "db": "PACKETSTORM", "id": "77564" }, { "db": "PACKETSTORM", "id": "76704" }, { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" }, { "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "db": "PACKETSTORM", "id": "77574" }, { "db": "PACKETSTORM", "id": "76710" }, { "db": "PACKETSTORM", "id": "77564" }, { "db": "PACKETSTORM", "id": "76704" }, { "db": "NVD", "id": "CVE-2009-1011" }, { "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-04-09T00:00:00", "db": "BID", "id": "34461" }, { "date": "2009-04-09T00:00:00", "db": "BID", "id": "34994" }, { "date": "2009-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "date": "2009-05-18T15:35:49", "db": "PACKETSTORM", "id": "77574" }, { "date": "2009-04-15T23:15:44", "db": "PACKETSTORM", "id": "76710" }, { "date": "2009-05-16T18:42:37", "db": "PACKETSTORM", "id": "77564" }, { "date": "2009-04-15T15:08:54", "db": "PACKETSTORM", "id": "76704" }, { "date": "2009-04-15T10:30:01", "db": "NVD", "id": "CVE-2009-1011" }, { "date": "2009-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-09-01T16:22:00", "db": "BID", "id": "34461" }, { "date": "2009-05-19T19:20:00", "db": "BID", "id": "34994" }, { "date": "2014-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001241" }, { "date": "2014-01-14T03:46:08.537000", "db": "NVD", "id": "CVE-2009-1011" }, { "date": "2009-06-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200904-328" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle Application Server of Outside In Technology Component vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001241" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "34461" }, { "db": "BID", "id": "34994" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.