Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of OJVM.ĬVSS v3.0 Base Score 5.3 (Availability impacts). Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise OJVM. Supported versions that are affected are 11.2.0.4 and 12.1.0.2. Vulnerability in the OJVM component of Oracle Database Server. For Windows platform version 12.1.0.2 and Linux, the score is 6.3 with scope Unchanged.ĬVSS v3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). Note: This score is for Windows platform version 11.2.0.4 of Database. Successful attacks of this vulnerability can result in takeover of SQL*Plus. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in SQL*Plus, attacks may significantly impact additional products. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with logon to the infrastructure where SQL*Plus executes to compromise SQL*Plus. Vulnerability in the SQL*Plus component of Oracle Database Server. This table provides the text form of the Risk Matrix for Oracle Database Server. Text Form of Risk Matrix for Oracle Database Server This page contains the following text format Risk Matrices: Please note that the CVE numbers in this document correspond to the same CVE numbers in the CPUApr2017 Advisory This document provides the text form of the CPUApr2017 Advisory Risk Matrices. Text Form of Oracle Critical Patch Update - April 2017 Risk Matrices
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |