Headline
CVE-2016-0642: Oracle Critical Patch Update Advisory - April 2016
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
Click to view our Accessibility Policy
Skip to content
Security Alerts
Oracle Critical Patch Update Advisory - April 2016****Description
A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to: Critical Patch Updates and Security Alerts for information about Oracle Security Advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.
This Critical Patch Update contains 136 new security fixes across the product families listed below. Please note that a blog entry summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at https://blogs.oracle.com/security.
Please note that on March 23, 2016, Oracle released Security Alert for Java SE for CVE-2016-0636 . Customers of affected Oracle product(s) are strongly advised to apply the fixes that were announced for CVE-2016-0636.
Please also note that the vulnerabilities in this Critical Patch Update are scored using versions 3.0 and 2.0 of Common Vulnerability Scoring Standard (CVSS). Future Critical Patch Updates and Security Alerts will be scored using CVSS version 3.0 only.
This Critical Patch Update advisory is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle’s use of CVRF is available here.
Affected Products and Components
Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Products and Versions column. Please click on the link in the Patch Availability column below or in the Patch Availability Table to access the documentation for those patches.
The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:
Affected Products and Versions
Patch Availability
Oracle Database Server, version(s) 11.2.0.4, 12.1.0.1, 12.1.0.2
Database
Oracle API Gateway, version(s) 11.1.2.3.0, 11.1.2.4.0
Fusion Middleware
Oracle BI Publisher, version(s) 12.2.1.0.0
Fusion Middleware
Oracle Business Intelligence Enterprise Edition, version(s) 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0
Fusion Middleware
Oracle Exalogic Infrastructure, version(s) 1.0, 2.0
Fusion Middleware
Oracle GlassFish Server, version(s) 2.1.1
Fusion Middleware
Oracle HTTP Server, version(s) 12.1.2.0, 12.1.3.0
Fusion Middleware
Oracle iPlanet Web Proxy Server, version(s) 4.0
Fusion Middleware
Oracle iPlanet Web Server, version(s) 7.0
Fusion Middleware
Oracle OpenSSO, version(s) 3.0-0.7
Fusion Middleware
Oracle Outside In Technology, version(s) 8.5.0, 8.5.1, 8.5.2
Fusion Middleware
Oracle Traffic Director, version(s) 11.1.1.7.0, 11.1.1.9.0
Fusion Middleware
Oracle Tuxedo, version(s) 12.1.1.0
Fusion Middleware
Oracle WebCenter Sites, version(s) 11.1.1.8.0, 12.2.1
Fusion Middleware
Oracle WebLogic Server, version(s) 10.3.6, 12.1.2, 12.1.3, 12.2.1
Fusion Middleware
Oracle Application Testing Suite, version(s) 12.4.0.2, 12.5.0.2
Enterprise Manager
OSS Support Tools Oracle Explorer, version(s) 8.11.16.3.8
Enterprise Manager
Oracle E-Business Suite, version(s) 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5
E-Business Suite
Oracle Agile Engineering Data Management, version(s) 6.1.3.0, 6.2.0.0
Oracle Supply Chain Products
Oracle Agile PLM, version(s) 9.3.1.1, 9.3.1.2, 9.3.2, 9.3.3
Oracle Supply Chain Products
Oracle Complex Maintenance, Repair, and Overhaul, version(s) 12.1.1, 12.1.2, 12.1.3
Oracle Supply Chain Products
Oracle Configurator, version(s) 12.1, 12.2
Oracle Supply Chain Products
Oracle Transportation Management, version(s) 6.1, 6.2
Oracle Supply Chain Products
PeopleSoft Enterprise HCM, version(s) 9.1, 9.2
PeopleSoft
PeopleSoft Enterprise HCM ePerformance, version(s) 9.2
PeopleSoft
PeopleSoft Enterprise PeopleTools, version(s) 8, 8.53, 8.54, 8.55, 54
PeopleSoft
PeopleSoft Enterprise SCM, version(s) 9.1, 9.2
PeopleSoft
JD Edwards EnterpriseOne Tools, version(s) 9.1, 9.2
JD Edwards
Siebel Applications, version(s) 8.1.1, 8.2.2
Siebel
Oracle Communications User Data Repository, version(s) 10.0.1
Oracle Communications User Data Repository
Oracle Retail MICROS ARS POS, version(s) 1.5
Oracle Retail MICROS ARS POS
Oracle Retail MICROS C2, version(s) 9.89.0.0
Oracle Retail MICROS C2
Oracle Retail Xstore Point of Service, version(s) 5.0, 5.5, 6.0, 6.5, 7.0, 7.1
Oracle Retail Xstore Point of Service
Oracle Life Sciences Data Hub, version(s) 2.1
Health Sciences
Oracle FLEXCUBE Direct Banking, version(s) 12.0.2, 12.0.3
Oracle FLEXCUBE
Oracle Java SE, version(s) 6u113, 7u99, 8u77
Oracle Java SE
Oracle Java SE Embedded, version(s) 8u77
Oracle Java SE
Oracle JRockit, version(s) R28.3.9
Oracle Java SE
Fujitsu M10-1, M10-4, M10-4S Servers, version(s) prior to XCP 2290
Oracle and Sun Systems Products Suite
Oracle Ethernet Switch ES2-72, Oracle Ethernet Switch ES2-64, version(s) prior to 2.0.0.6
Oracle and Sun Systems Products Suite
Solaris, version(s) 10, 11.3
Oracle and Sun Systems Products Suite
Solaris Cluster, version(s) 4.2
Oracle and Sun Systems Products Suite
SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers, version(s) prior to XCP 1121
Oracle and Sun Systems Products Suite
Sun Storage Common Array Manager, version(s) 6.9.0
Oracle and Sun Systems Products Suite
Oracle VM VirtualBox, version(s) prior to 4.3.36, prior to 5.0.18
Oracle Linux and Virtualization
Sun Ray Software, version(s) 11.1
Oracle Linux and Virtualization
MySQL Enterprise Monitor, version(s) 3.0.25 and prior, 3.1.2 and prior
Oracle MySQL Product Suite
MySQL Server, version(s) 5.5.48 and prior, 5.6.29 and prior, 5.7.11 and prior
Oracle MySQL Product Suite
Oracle Berkeley DB, version(s) 11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
Berkeley DB
Patch Availability Table and Risk Matrices****Patch Availability Table
For each administered Oracle product, consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2016 Documentation Map, My Oracle Support Note 2031792.1.
Product Group
Risk Matrix
Patch Availability and Installation Information
Oracle Database
Oracle Database Risk Matrix
Patch Set Update and Critical Patch Update April 2016 Availability Document, My Oracle Support Note 2102148.1
Oracle Fusion Middleware
Oracle Fusion Middleware Risk Matrix
Patch Set Update and Critical Patch Update April 2016 Availability Document, My Oracle Support Note 2102148.1
Oracle Fusion Applications
Oracle Database Risk Matrix and Oracle Fusion Middleware Risk Matrix
Vulnerabilities affecting Oracle Database and Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document (April 2016) My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.
Oracle Enterprise Manager
Oracle Enterprise Manage Risk Matrix
Patch Set Update and Critical Patch Update April 2016 Availability Document, My Oracle Support Note 2102148.1
Oracle Applications - E-Business Suite
Oracle E-Business Suite Risk Matrix
Patch Set Update and Critical Patch Update April 2016 Availability Document, My Oracle Support Note 2113110.1
Oracle Applications - Oracle Supply Chain, PeopleSoft Enterprise, JD Edwards and Siebel
Oracle Supply Chain Risk Matrix Oracle PeopleSoft Enterprise Risk Matrix Oracle JD Edwards Risk Matrix Oracle Siebel Risk Matrix
Critical Patch Update Knowledge Document for Oracle Supply Chain, PeopleSoft Enterprise, JD Edwards and Siebel Product Suite, My Oracle Support Note 2126749.1
Oracle Communications Applications Suite
Oracle Communications Applications Risk Matrix
Critical Patch Update April 2016 Availability Document for Communications User Data Repository, My Oracle Support Note 2061541.1
Oracle Retail Applications Suite
Oracle Retail Applications Risk Matrix
- Critical Patch Update April 2016 Availability Document for Oracle Retail MICROS ARS POS, My Oracle Support Note 2122151.1
- Critical Patch Update April 2016 Availability Document for Oracle Retail MICROS C2, My Oracle Support Note 2122154.1
- Critical Patch Update April 2016 Availability Document for Oracle Retail Xstore Point of Service, My Oracle Support Note 2122055.1
Oracle Health Sciences Applications Suite
Oracle Health Sciences Applications Risk Matrix
- Critical Patch Update April 2016 Availability Document for Oracle Health Sciences Applications, My Oracle Support Note 2117308.1
Oracle Financial Services Softwares Suite
Oracle Financial Services Software Risk Matrix
- Contact Oracle Customer Support for patches
Oracle Java SE
Oracle Java SE Risk Matrix
- Critical Patch Update April 2016 Patch Availability Document for Java SE, My Oracle Support Note 2123093.1
- Users running Java SE with a browser can download the latest release from http://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.
- The latest JavaFX release is included with the latest update of JDK and JRE 7 and 8.
Oracle and Sun Systems Products Suite
Oracle and Sun Systems Products Suite Risk Matrix
Critical Patch Update April 2016 Patch Delivery Document for Oracle and Sun Systems Product Suite, My Oracle Support Note 2123591.1
Oracle Linux and Virtualization Products
Oracle Linux and Virtualization Products Risk Matrix
Critical Patch Update April 2016 Patch Delivery Document for Oracle Linux and Virtualization Products, My Oracle Support Note 2118962.1
Oracle MySQL
Oracle MySQL Risk Matrix
Critical Patch Update April 2016 Patch Availability Document for Oracle MySQL Products, My Oracle Support Note 2120034.1
Oracle Berkeley DB
Oracle Berkeley DB Risk Matrix
Critical Patch Update April 2016 Patch Availability Document for Oracle Berkeley DB, My Oracle Support Note 2128264.1
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories . An English text version of the risk matrices provided in this document is available here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Starting with this Critical Patch Update, security vulnerabilities are now scored using CVSS version 3.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.0). Previous Critical Patch Updates were scored using CVSS version 2.0. To aid in the transition from CVSS version 2.0 to CVSS version 3.0 scoring, for this Critical Patch Update only, both scores are provided (see Critical Patch Update - April 2016 CVSS version 2.0).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose information about the security analysis, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Workarounds
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. Until you apply the CPU fixes, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Skipped Critical Patch Updates
Oracle strongly recommends that customers apply security fixes as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security fixes announced in this CPU, please review previous Critical Patch Update advisories to determine appropriate actions.
Product Dependencies
Oracle products may have dependencies on other Oracle products. Hence security vulnerability fixes announced in this Critical Patch Update may affect one or more dependent Oracle products. For details regarding these dependencies and how to apply patches to dependent products, please refer to Patch Set Update and Critical Patch Update April 2016 Availability Document, My Oracle Support Note 2102148.1.
Critical Patch Update Supported Products and Versions
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy . We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1 . Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
Products in Extended Support
Patches released through the Critical Patch Update program are available to customers who have Extended Support under the Lifetime Support Policy . Customers must have a valid Extended Support service contract to download patches released through the Critical Patch Update program for products in the Extended Support Phase.
Credit Statement
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle: Accenture TVM Prague; Alex Gaynor; Alexander Innes of Necurity; bo13oy of Trend Micro’s Zero Day Initiative; bo13oy of CloverSec Labs; Brian Martin of Tenable Network Security; Chen Qin of Alpha Lab of Beijing Topsec; Daniel Bleichenbacher of Google; David Cash of NCC Group; David Litchfield of Google; Dennis Tighe of Amazon Web Services IT Security; Discovered by Aleksandar Nikolic of Cisco Talos; Jacob Baines of Tenable Network Security; Jakub Palaczynski from ING Services Polska; Joshua Maddux; Lionel Debroux; Marcin Wołoszyn of ING Services Polska; Mark E D Thomas; Matias Mevied of Onapsis; Matthias Kaiser of Code White; Paul Kehrer; Pierre Ernst of Salesforce.com; Quan Nguyen of Google; s1x and m4xk from Docler Holding IT Security Team; Steffen Guertler of Bosch Software Innovations GmbH; Sule Bekin of Turk Telekom; and Thomas Van Tongerloo of Hewlett Packard Enterprise.
Security-In-Depth Contributors
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update Advisory, Oracle recognizes Alexander Kornbrust of Red Database Security; bo13oy of CloverSec Labs; David Litchfield of Google; Devin Rosenbauer of Identity Works LLC; John Page (hyp3rlinx); and Matias Mevied of Onapsis for contributions to Oracle’s Security-In-Depth program.
On-Line Presence Security Contributors
Oracle provides acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.
For this quarter, Oracle recognizes Adam Willard of Raytheon Foreground Security; Ali Tabish; Kenan Gümüş; Khair Alhamad; Muzammil Abbas Kayani; and Xmiss Moroccan for contributions to Oracle’s On-Line Presence Security program.
Critical Patch Update Schedule
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
- 19 July 2016
- 18 October 2016
- 17 January 2017
- 18 April 2017
References
- Oracle Critical Patch Updates and Security Alerts main page [ Oracle Technology Network ]
- Critical Patch Update - April 2016 CVSS version 2.0 [ My Oracle Technology Network ]
- Critical Patch Update - April 2016 Documentation Map [ My Oracle Support Note 2031792.1 ]
- Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions [ CPU FAQ ]
- Risk Matrix definitions [ Risk Matrix Definitions ]
- Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS Scoring ]
- English text version of the risk matrices [ Oracle Technology Network ]
- CVRF XML version of the risk matrices [ Oracle Technology Network ]
- The Oracle Software Security Assurance Blog [ The Oracle Software Security Assurance Blog ]
- List of public vulnerabilities fixed in Critical Patch Updates and Security Alerts [ Oracle Technology Network ]
- Software Error Correction Support Policy [ My Oracle Support Note 209768.1 ]
Modification History
Date
Note
2016-December-20
Rev 3. Updated supported versions affected for CVE-2016-3465.
2016-April-25
Rev 2. Updated credit statements.
2016-April-19
Rev 1. Initial Release.
Appendix - Oracle Database Server****Oracle Database Server Executive Summary
This Critical Patch Update contains 5 new security fixes for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. None of these fixes are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
Please note that the Oracle Critical Patch Update Advisory for January 2016 was updated post release to clarify that CVE-2015-4923 is applicable to client-only installations. Database customers are strongly advised to apply the patches released in CPUJan2016 or later to their client-only installations.
Oracle Database Server Risk Matrix
CVE#
Component
Package and/or Privilege Required
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-3454
Java VM
None
Multiple
Yes
9.0
Network
High
None
None
Changed
High
High
High
11.2.0.4, 12.1.0.1, 12.1.0.2
CVE-2016-0681
Oracle OLAP
Execute on DBMS_AW
Oracle Net
No
7.8
Local
Low
Low
None
Un- changed
High
High
High
11.2.0.4, 12.1.0.1, 12.1.0.2
CVE-2016-0677
RDBMS Security
None
Kerberos
Yes
5.9
Network
High
None
None
Un- changed
None
None
High
12.1.0.1, 12.1.0.2
CVE-2016-0690
RDBMS Security
Create Session
Oracle Net
No
3.3
Local
Low
Low
None
Un- changed
None
Low
None
11.2.0.4, 12.1.0.1, 12.1.0.2
CVE-2016-0691
RDBMS Security
Create Session
Oracle Net
No
3.3
Local
Low
Low
None
Un- changed
None
Low
None
11.2.0.4, 12.1.0.1, 12.1.0.2
Appendix - Oracle Fusion Middleware****Oracle Fusion Middleware Executive Summary
This Critical Patch Update contains 22 new security fixes for Oracle Fusion Middleware. 21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the April 2016 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2016 Patch Availability Document for Oracle Products, My Oracle Support Note 2102148.1.
Oracle Fusion Middleware Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2015-7182
Oracle GlassFish Server
Security
HTTPS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
2.1.1
CVE-2015-7182
Oracle OpenSSO
Web Agents
HTTPS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
3.0-0.7
CVE-2015-7182
Oracle Traffic Director
Security
HTTPS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
11.1.1.7.0, 11.1.1.9.0
CVE-2015-3253
Oracle WebCenter Sites
Sites
Multiple
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
11.1.1.8.0, 12.2.1
CVE-2016-0638
Oracle WebLogic Server
Java Messaging Service
JMS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
10.3.6, 12.1.2, 12.1.3, 12.2.1
CVE-2015-7182
Oracle iPlanet Web Proxy Server
Security
HTTPS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
4.0
CVE-2015-7182
Oracle iPlanet Web Server
Security
HTTPS
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
7.0
CVE-2016-3455
Oracle Outside In Technology
Outside In Filters
Multiple
Yes
8.6
Network
Low
None
None
Un- changed
High
Low
Low
8.5.0, 8.5.1, 8.5.2
See Note 1
CVE-2015-7547
Oracle Exalogic Infrastructure
Base Image
multiple
Yes
8.1
Network
High
None
None
Un- changed
High
High
High
1.0, 2.0
CVE-2014-3576
Oracle BI Publisher
Security
Multiple
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
12.2.1.0.0
CVE-2016-0479
Oracle Business Intelligence Enterprise Edition
Analytics Scorecard
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0
CVE-2016-0675
Oracle WebLogic Server
Console
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
10.3.6, 12.1.2, 12.1.3
CVE-2016-0700
Oracle WebLogic Server
Console
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
10.3.6, 12.1.2, 12.1.3
CVE-2016-3416
Oracle WebLogic Server
Console
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
10.3.6, 12.1.2, 12.1.3, 12.2.1
CVE-2015-3197
Oracle Exalogic Infrastructure
Base Image
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
1.0, 2.0
CVE-2015-3197
Oracle Tuxedo
Open SSL
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
12.1.1.0
CVE-2016-0468
Oracle Business Intelligence Enterprise Edition
Analytics Web General
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0
CVE-2016-0696
Oracle WebLogic Server
Console
HTTP
Yes
5.4
Network
Low
None
Required
Un- changed
Low
Low
None
10.3.6
CVE-2015-3195
Oracle API Gateway
OAG
HTTPS
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
11.1.2.3.0, 11.1.2.4.0
CVE-2015-3195
Oracle Exalogic Infrastructure
Network Infra Framework
HTTPS
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
1.0, 2.0
CVE-2016-0671
Oracle HTTP Server
OSSL Module
HTTPS
Yes
3.7
Network
High
None
None
Un- changed
Low
None
None
12.1.2.0
CVE-2016-0688
Oracle WebLogic Server
Core Components
HTTP
Yes
3.7
Network
High
None
None
Un- changed
None
Low
None
10.3.6, 12.1.2, 12.1.3
Notes:
- Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. The score here assumes that the hosting software passes data received over the network to Outside In Technology code. In any other cases, the scores could be lower than this.
Additional CVEs addressed:
- CVE-2015-7182 fix also addresses CVE-2015-2721, CVE-2015-4000, CVE-2015-7181, CVE-2015-7183, CVE-2015-7575.
Appendix - Oracle Enterprise Manager Grid Control****Oracle Enterprise Manager Grid Control Executive Summary
This Critical Patch Update contains 2 new security fixes for Oracle Enterprise Manager Grid Control. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2016 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2016 Patch Availability Document for Oracle Products, My Oracle Support Note 2102148.1.
Oracle Enterprise Manager Grid Control Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2015-7501
Oracle Application Testing Suite
Install
HTTPS
No
8.8
Network
Low
Low
None
Un- changed
High
High
High
12.4.0.2, 12.5.0.2
CVE-2015-3197
OSS Support Tools Oracle Explorer
Binaries
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
8.11.16.3.8
Appendix - Oracle Applications****Oracle E-Business Suite Executive Summary
This Critical Patch Update contains 7 new security fixes for the Oracle E-Business Suite. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2016 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Releases 11i and 12 Critical Patch Update Knowledge Document (April 2016), My Oracle Support Note 2113110.1.
Oracle E-Business Suite Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-3466
Oracle Field Service
Wireless
HTTP
Yes
9.1
Network
Low
None
None
Un- changed
High
High
None
12.1.1, 12.1.2, 12.1.3
CVE-2016-3439
Oracle CRM Wireless
Call Phone Number Page
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.3
CVE-2016-3437
Oracle CRM Wireless
Person Address Page
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.3
CVE-2016-3436
Oracle Common Applications Calendar
Tasks
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1, 12.1.2, 12.1.3
CVE-2016-3447
Oracle Applications Framework
OAF Core
HTTP
Yes
6.9
Network
High
None
Required
Changed
High
Low
None
12.1.3, 12.2.3, 12.2.4, 12.2.5
CVE-2016-0697
Oracle Application Object Library
DB Privileges
Oracle Net
No
6.0
Local
Low
High
None
Un- changed
High
High
None
12.1.3, 12.2.3, 12.2.4, 12.2.5
CVE-2016-3434
Oracle Application Object Library
Logout
HTTP
Yes
4.7
Network
Low
None
Required
Changed
None
Low
None
12.1.3, 12.2.3, 12.2.4, 12.2.5
Oracle Supply Chain Products Suite Executive Summary
This Critical Patch Update contains 6 new security fixes for the Oracle Supply Chain Products Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Supply Chain Products Suite Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-3456
Oracle Complex Maintenance, Repair, and Overhaul
Dialog Box
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1, 12.1.2, 12.1.3
CVE-2016-3438
Oracle Configurator
JRAD Heartbeat
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1, 12.2
CVE-2016-3420
Oracle Agile PLM
Security
HTTP
No
6.4
Network
Low
Low
None
Changed
Low
Low
None
9.3.1.1, 9.3.1.2, 9.3.2, 9.3.3
CVE-2016-3431
Oracle Agile PLM
Security
HTTP
No
6.4
Network
Low
Low
None
Changed
Low
Low
None
9.3.1.1, 9.3.1.2, 9.3.2, 9.3.3
CVE-2015-3195
Oracle Transportation Management
Install
HTTPS
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
6.1, 6.2
CVE-2016-3428
Oracle Agile Engineering Data Management
Engineering Communication Interface
ECI (Proprietary EDM Protocol)
Yes
3.1
Adjacent Network
High
None
None
Un- changed
None
None
Low
6.1.3.0, 6.2.0.0
Oracle PeopleSoft Products Executive Summary
This Critical Patch Update contains 15 new security fixes for Oracle PeopleSoft Products. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle PeopleSoft Products Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0679
PeopleSoft Enterprise PeopleTools
PIA Grids
HTTP
No
8.7
Network
Low
Low
Required
Changed
None
High
High
8.53, 8, 54, 8.55
CVE-2016-3421
PeopleSoft Enterprise PeopleTools
Activity Guide
HTTP
No
7.4
Network
Low
Low
None
Changed
Low
Low
Low
8.53, 8.54, 8.55
CVE-2016-0407
PeopleSoft Enterprise HCM
Fusion HR Talent Integration
HTTP
No
6.5
Network
Low
Low
None
Un- changed
High
None
None
9.1, 9.2
CVE-2015-3197
PeopleSoft Enterprise PeopleTools
Security
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
8.53, 8.54, 8.55
CVE-2016-3460
PeopleSoft Enterprise HCM
ePerformance
HTTP
No
5.4
Network
Low
Low
None
Un- changed
Low
Low
None
9.2
CVE-2016-0408
PeopleSoft Enterprise PeopleTools
Activity Guide
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-0685
PeopleSoft Enterprise PeopleTools
File Processing
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-3417
PeopleSoft Enterprise PeopleTools
PIA Search Functionality
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-3442
PeopleSoft Enterprise PeopleTools
Portal
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-0698
PeopleSoft Enterprise PeopleTools
Rich Text Editor
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-3423
PeopleSoft Enterprise PeopleTools
Rich Text Editor
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-0683
PeopleSoft Enterprise PeopleTools
Search Framework
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.53, 8.54, 8.55
CVE-2016-0680
PeopleSoft Enterprise SCM
Services Procurement
HTTP
No
5.4
Network
Low
Low
None
Un- changed
Low
Low
None
9.1, 9.2
CVE-2016-3435
PeopleSoft Enterprise PeopleTools
PIA Core Technology
HTTP
Yes
4.7
Network
Low
None
Required
Changed
None
None
Low
8.53, 8.54, 8.55
CVE-2016-3457
PeopleSoft Enterprise HCM ePerformance
Security
HTTP
No
4.6
Network
Low
Low
Required
Un- changed
Low
Low
None
9.2
Additional CVEs addressed:
- CVE-2015-3197 fix also addresses CVE-2015-3195.
Oracle JD Edwards Products Executive Summary
This Critical Patch Update contains 1 new security fix for Oracle JD Edwards Products. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
Oracle JD Edwards Products Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2015-1793
JD Edwards EnterpriseOne Tools
OneWorld Tools Security
HTTP
Yes
6.5
Network
Low
None
None
Un- changed
Low
Low
None
9.1, 9.2
Oracle Siebel CRM Executive Summary
This Critical Patch Update contains 2 new security fixes for Oracle Siebel CRM. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Siebel CRM Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0673
Siebel UI Framework
UIF Open UI
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
8.1.1, 8.2.2
CVE-2016-0674
Siebel Core - Common Components
HTTP
No
4.4
Local
Low
Low
None
Un- changed
Low
Low
None
8.1.1, 8.2.2
Appendix - Oracle Industry Applications****Oracle Communications Applications Executive Summary
This Critical Patch Update contains 1 new security fix for Oracle Communications Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Communications Applications Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2014-2532
Oracle Communications User Data Repository
Security
OpenSSH
No
4.9
Network
High
Low
None
Changed
Low
Low
None
10.0.1
Oracle Retail Applications Executive Summary
This Critical Patch Update contains 3 new security fixes for Oracle Retail Applications. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
Oracle Retail Applications Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0684
Oracle Retail MICROS ARS POS
POS
Oracle Net
No
6.5
Network
Low
Low
None
Un- changed
High
None
None
1.5
CVE-2016-0469
Oracle Retail MICROS C2
POS
HTTPS
No
5.5
Local
Low
Low
None
Un- changed
High
None
None
9.89.0.0
CVE-2016-3429
Oracle Retail Xstore Point of Service
Xstore Services
HTTP
No
4.5
Physical
High
Low
Required
Un- changed
High
Low
None
5.0, 5.5, 6.0, 6.5, 7.0, 7.1
Oracle Health Sciences Applications Executive Summary
This Critical Patch Update contains 1 new security fix for Oracle Health Sciences Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Health Sciences Applications Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2015-3195
Oracle Life Sciences Data Hub
Open SSL
HTTPS
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
2.1
Appendix - Oracle Financial Services Software****Oracle Financial Services Software Executive Summary
This Critical Patch Update contains 4 new security fixes for Oracle Financial Services Software. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Financial Services Software Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0699
Oracle FLEXCUBE Direct Banking
Login
HTTP
Yes
9.1
Network
Low
None
None
Un- changed
High
High
None
12.0.2, 12.0.3
CVE-2016-0672
Oracle FLEXCUBE Direct Banking
Pre-Login
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
12.0.2, 12.0.3
CVE-2016-3463
Oracle FLEXCUBE Direct Banking
Pre-Login
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
12.0.3
CVE-2016-3464
Oracle FLEXCUBE Direct Banking
Accounts
HTTP
No
5.7
Network
Low
Low
Required
Un- changed
High
None
None
12.0.3
Appendix - Oracle Java SE****Oracle Java SE Executive Summary
This Critical Patch Update contains 9 new security fixes for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.
Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 7 and 8 releases.
Oracle Java SE Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-3443
Java SE
2D
Multiple
Yes
9.6
Network
Low
None
Required
Changed
High
High
High
Java SE: 6u113, 7u99, 8u77
See Note 1
CVE-2016-0687
Java SE, Java SE Embedded
Hotspot
Multiple
Yes
9.6
Network
Low
None
Required
Changed
High
High
High
Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77
See Note 1
CVE-2016-0686
Java SE, Java SE Embedded
Serialization
Multiple
Yes
9.6
Network
Low
None
Required
Changed
High
High
High
Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77
See Note 1
CVE-2016-3427
Java SE, Java SE Embedded, JRockit
JMX
Multiple
Yes
9.0
Network
High
None
None
Changed
High
High
High
Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77; JRockit: R28.3.9
See Note 2
CVE-2016-3449
Java SE
Deployment
Multiple
Yes
8.3
Network
High
None
Required
Changed
High
High
High
Java SE: 6u113, 7u99, 8u77
See Note 1
CVE-2016-0695
Java SE, Java SE Embedded, JRockit
Security
Multiple
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77; JRockit: R28.3.9
See Note 3
CVE-2016-3425
Java SE, Java SE Embedded, JRockit
JAXP
Multiple
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
Java SE: 6u113, 7u99, 8u77; Java SE Embedded: 8u77; JRockit: R28.3.9
See Note 2
CVE-2016-3422
Java SE
2D
Multiple
Yes
4.3
Network
Low
None
Required
Un- changed
None
None
Low
Java SE: 6u113, 7u99, 8u77
See Note 1
CVE-2016-3426
Java SE, Java SE Embedded
JCE
Multiple
Yes
3.1
Network
High
None
Required
Un- changed
Low
None
None
Java SE: 8u77; Java SE Embedded: 8u77
See Note 1
Notes:
- This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
- Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
- Applies to client and server deployment of JSSE
Appendix - Oracle Sun Systems Products Suite****Oracle Sun Systems Products Suite Executive Summary
This Critical Patch Update contains 18 new security fixes for the Oracle Sun Systems Products Suite. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
Oracle Sun Systems Products Suite Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0693
Solaris
PAM LDAP module
Multiple
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
10, 11.3
CVE-2015-7547
Fujitsu M10-1, M10-4, M10-4S Servers
XCP Firmware
Multiple
Yes
8.1
Network
High
None
None
Un- changed
High
High
High
XCP prior to XCP2290
CVE-2016-3441
Solaris
Filesystem
None
No
7.8
Local
Low
Low
None
Un- changed
High
High
High
10, 11.3
CVE-2013-4786
Fujitsu M10-1, M10-4, M10-4S Servers
XCP Firmware
IPMI
Yes
7.5
Network
Low
None
None
Un- changed
High
None
None
XCP prior to XCP2290
CVE-2015-1789
SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers
XCP Firmware
HTTPS
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
XCP prior to XCP 1121
CVE-2015-7236
Solaris
Utilities
RPC
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
10, 11.3
CVE-2015-1793
Oracle Ethernet Switch ES2-72, Oracle Ethernet Switch ES2-64
Firmware
HTTPS
Yes
6.5
Network
Low
None
None
Un- changed
Low
Low
None
Versions prior to 2.0.0.6
CVE-2015-3238
SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers
XCP Firmware
Multiple
Yes
6.5
Network
Low
None
None
Un- changed
Low
None
Low
XCP prior to XCP 1121
CVE-2016-0669
Solaris
Fwflash
None
No
6.0
Local
Low
High
None
Un- changed
None
High
High
11.3
CVE-2013-2566
SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers
XCP Firmware
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
XCP prior to XCP 1121
CVE-2016-3462
Solaris
Network Configuration Service
None
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
11.3
CVE-2016-3465
Solaris
ZFS
None
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
10, 11.3
CVE-2011-4461
Sun Storage Common Array Manager
Jetty Web Server
HTTP
Yes
5.3
Network
Low
None
None
Un- changed
None
None
Low
6.9.0
CVE-2016-0623
Solaris
Automated Installer
Multiple
Yes
4.7
Network
Low
None
Required
Changed
None
Low
None
11.3
CVE-2016-0676
Solaris
Kernel
None
No
4.7
Local
High
Low
None
Un- changed
None
None
High
10
CVE-2015-4000
SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers
XCP Firmware
HTTPS
Yes
3.7
Network
High
None
None
Un- changed
None
Low
None
XCP prior to XCP 1121
CVE-2016-3419
Solaris
Filesystem
None
No
3.3
Local
Low
Low
None
Un- changed
None
None
Low
10, 11.3
CVE-2014-3566
Solaris Cluster
GlassFish Server
HTTPS
Yes
3.1
Network
High
None
Required
Un- changed
Low
None
None
4.2
Additional CVEs addressed:
- CVE-2013-2566 fix also addresses CVE-2015-2808.
- ACVE-2015-1789 fix also addresses CVE-2015-1790.
Appendix - Oracle Linux and Virtualization****Oracle Virtualization Executive Summary
This Critical Patch Update contains 4 new security fixes for Oracle Virtualization. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
Oracle Virtualization Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2015-3195
Oracle VM VirtualBox
Core
HTTPS
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
VirtualBox prior to 4.3.36, prior to 5.0.14
CVE-2015-3195
Sun Ray Software
Sun Ray Server Software
HTTPS
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
11.1
CVE-2016-0678
Oracle VM VirtualBox
Core
None
No
6.7
Local
High
Low
Required
Un- changed
High
High
High
VirtualBox prior to 5.0.18
CVE-2015-3197
Oracle VM VirtualBox
Core
HTTPS
Yes
5.9
Network
High
None
None
Un- changed
High
None
None
VirtualBox prior to 5.0.16
Additional CVEs addressed:
- CVE-2015-3195 fix also addresses CVE-2015-1794, CVE-2015-3193, CVE-2015-3194, CVE-2015-3196.
Appendix - Oracle MySQL****Oracle MySQL Executive Summary
This Critical Patch Update contains 31 new security fixes for Oracle MySQL. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here .
Oracle MySQL Risk Matrix
CVE#
component
Sub-component
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0705
MySQL Server
Server: Packaging
MySQL Protocol
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0639
MySQL Server
Server: Pluggable Authentication
MySQL Protocol
Yes
9.8
Network
Low
None
None
Un- changed
High
High
High
5.6.29 and earlier, 5.7.11 and earlier
CVE-2015-3194
MySQL Server
Server: Security: Encryption
MySQL Protocol
Yes
7.5
Network
Low
None
None
Un- changed
None
None
High
5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-3461
MySQL Enterprise Monitor
Monitoring: Server
Multiple
No
7.2
Network
Low
High
None
Un- changed
High
High
High
3.0.25 and earlier, 3.1.2 and earlier
CVE-2016-0640
MySQL Server
Server: DML
MySQL Protocol
No
6.1
Local
Low
Low
None
Un- changed
None
Low
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-2047
MySQL Server
Server: Connection Handling
MySQL Protocol
Yes
5.9
Network
High
None
None
Un- changed
None
High
None
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0644
MySQL Server
Server: DDL
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0646
MySQL Server
Server: DML
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0652
MySQL Server
Server: DML
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0647
MySQL Server
Server: FTS
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0653
MySQL Server
Server: FTS
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0654
MySQL Server
Server: InnoDB
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0656
MySQL Server
Server: InnoDB
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0657
MySQL Server
Server: JSON
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
High
None
None
5.7.11 and earlier
CVE-2016-0658
MySQL Server
Server: Optimizer
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0651
MySQL Server
Server: Optimizer
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.46 and earlier
CVE-2016-0659
MySQL Server
Server: Optimizer
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.11 and earlier
CVE-2016-0648
MySQL Server
Server: PS
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0649
MySQL Server
Server: PS
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0662
MySQL Server
Server: Partition
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.7.11 and earlier
CVE-2016-0650
MySQL Server
Server: Replication
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0665
MySQL Server
Server: Security: Encryption
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.6.28 and earlier 5.7.10 and earlier
CVE-2016-0666
MySQL Server
Server: Security: Privileges
MySQL Protocol
No
5.5
Local
Low
Low
None
Un- changed
None
None
High
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0641
MySQL Server
Server: MyISAM
MySQL Protocol
No
5.1
Local
Low
High
None
Un- changed
Low
None
High
5.5.47 and earlier, 5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0642
MySQL Server
Server: Federated
MySQL Protocol
No
4.7
Local
High
High
None
Un- changed
None
Low
High
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0655
MySQL Server
Server: InnoDB
MySQL Protocol
No
4.7
Local
High
Low
None
Un- changed
None
None
High
5.6.29 and earlier, 5.7.11 and earlier
CVE-2016-0661
MySQL Server
Server: Options
MySQL Protocol
No
4.7
Local
High
Low
None
Un- changed
None
None
High
5.6.28 and earlier, 5.7.10 and earlier
CVE-2016-0663
MySQL Server
Server: Performance Schema
MySQL Protocol
No
4.7
Local
High
Low
None
Un- changed
None
None
High
5.7.10 and earlier
CVE-2016-0667
MySQL Server
Server: Locking
MySQL Protocol
No
4.4
Local
Low
High
None
Un- changed
None
None
High
5.7.11 and earlier
CVE-2016-0668
MySQL Server
Server: InnoDB
MySQL Protocol
No
4.1
Local
High
High
None
Un- changed
None
None
High
5.6.28 and earlier 5.7.10 and earlier
CVE-2016-0643
MySQL Server
Server: DML
MySQL Protocl
No
3.3
Local
Low
Low
None
Un- changed
Low
None
None
5.5.48 and earlier, 5.6.29 and earlier, 5.7.11 and earlier
Additional CVEs addressed:
- CVE-2015-3194 fix also addresses CVE-2015-3195.
- CVE-2016-0705 fix also addresses CVE-2015-3197, CVE-2016-0702, CVE-2016-0797, CVE-2016-0798, CVE-2016-0799, CVE-2016-0800.
Appendix - Oracle Berkeley DB****Oracle Berkeley DB Executive Summary
This Critical Patch Update contains 5 new security fixes for Oracle Berkeley DB. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here.
Oracle Berkeley DB Risk Matrix
CVE#
Component
Package and/or Privilege Required
Protocol
Remote Exploit without Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base Score
Attack Vector
Attack Complex
Privs Req’d
User Interact
Scope
Confidentiality
Integrity
Availability
CVE-2016-0682
DataStore
None
None
No
7.8
Local
Low
None
Required
Un- changed
High
High
High
11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
CVE-2016-0689
DataStore
None
None
No
7.8
Local
Low
None
Required
Un- changed
High
High
High
11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
CVE-2016-0692
DataStore
None
None
No
7.8
Local
Low
None
Required
Un- changed
High
High
High
11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
CVE-2016-0694
DataStore
None
None
No
7.8
Local
Low
None
Required
Un- changed
High
High
High
11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
CVE-2016-3418
DataStore
None
None
No
7.8
Local
Low
None
Required
Un- changed
High
High
High
11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, 12.1.6.1.26
Why Oracle
- Analyst Reports
- Gartner MQ for Cloud ERP
- Cloud Economics
- Corporate Responsibility
- Diversity and Inclusion
- Security Practices
Learn
- What is cloud computing?
- What is CRM?
- What is Docker?
- What is Kubernetes?
- What is Python?
- What is SaaS?
What’s New
News
Oracle CloudWorld
Oracle Supports Ukraine
Oracle Red Bull Racing
Oracle Sustainability
Employee Experience Platform
© 2022 Oracle
Site Map
Privacy/Do Not Sell My Info
Ad Choices
Careers
Facebook
Twitter
LinkedIn
YouTube
Related news
An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.
IBM Security Directory Suite VA 8.0.1 through 8.0.1.19 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 228567.
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Fossil 2.18 on Windows allows attackers to cause a denial of service (daemon crash) via an XSS payload in a ticket. This occurs because the ticket data is stored in a temporary file, and the product does not properly handle the absence of this file after Windows Defender has flagged it as malware.
An issue was discovered in Poly EagleEye Director II before 2.2.2.1. os.system command injection can be achieved by an admin.
libnx_apl.so on Nexans FTTO GigaSwitch before 6.02N and 7.x before 7.02 implements a Backdoor Account for SSH logins on port 50200 or 50201.
An issue was discovered in Poly EagleEye Director II before 2.2.2.1. os.system command injection can be achieved by an admin.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.
Nexans FTTO GigaSwitch industrial/office switches HW version 5 suffer from having a hardcoded backdoor user and multiple outdated vulnerable software components.
Under certain circumstances, a vulnerability in Metasys ADS/ADX/OAS 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS 11 versions prior to 11.0.2 could allow a user to inject malicious code into the MUI Graphics web interface.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).
Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
IBM Cognos Controller 10.2.0, 10.2.1, 10.3.0, 10.3.1, and 10.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158332.
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/A...
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the l...
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.