{"vuid":"VU#210524","idnumber":"210524","name":"Oracle products contain multiple vulnerabilities","keywords":["Oracle","Oracle CPU October 2005","oracle_cpu_october_2005","remote code execution","denial of service","information disclosure","Oracle Database","Database Server","Collaboration Suite","E-Business Suite and Applications","Enterprise Manager","Enterprise Manager Grid Control","PeopleSoft EnterpriseOne","PeopleSoft One World Xe"],"overview":"Multiple vulnerabilities exist in numerous Oracle products. The severity and impacts of these vulnerabilities are varied and may include remote execution of arbitrary code, the disclosure of sensitive information, and denial-of-service conditions.","clean_desc":"Multiple vulnerabilities exist in numerous Oracle products including: Oracle Database Server 10g\nOracle9i Database Server\nOracle8i Database Server\nOracle8 Database Server\nOracle Enterprise Manager 10g Grid Control\nOracle Enterprise Manager Application Server Control\nOracle Enterprise Manager 10g Database Control\nOracle Application Server 10g\nOracle Application Server 10g\nOracle9i Application Server\nOracle9i Application Server\nOracle Collaboration Suite 10g\nOracle9i Collaboration Suite\nOracle E-Business Suite Release 11i\nOracle E-Business Suite Release 11.0\nOracle Clinical\nJD Edwards EnterpriseOne, OneWorld XE\nOracle Developer Suite\nOracle Workflow\nThe specific details of these vulnerabilities are unavailable. For more information concerning vulnerabilities, the conditions necessary to exploit them, and the patches Oracle has released to correct them, please refer to the Oracle Critical Patch Update for October 2005. Note that  According to public reports, the patches included in this update, as well as previous updates, may not adequately correct all security vulnerabilities.","impact":"The complete impact of these issues varies depending on the particular application and vulnerability being attacked. Potential consequences may include the remote execution of arbitrary code, disclosure of sensitive information, and denial-of-service conditions. Database compromises may result in the disclosure of sensitive personal information, such as credit card numbers, social security numbers, and health and patient information.","resolution":"Apply patches\nApply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005.","workarounds":"","sysaffected":"","thanks":"This document is based on information contained in the \nOracle Critical Patch Update for October 2005 Oracle credits the following parties for providing information regarding these vulnerabilities: Brian Carr; Sacha Faust of S.P.I. Dynamics, Inc.; Esteban Martínez Fayó of Application Security, Inc.; Alexander Kornbrust of Red Database Security; Steven Kost of Integrigy Corporation; David Litchfield of NGSS Limited; noderat ratty, Keigo Yamazaki of Little eArth Corporation Co., Ltd.","author":"This document was written by Jeff Gennari.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html","http://www.oracle.com/technology/deploy/security/alerts.htm"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-07T17:56:08Z","publicdate":"2005-10-18T00:00:00Z","datefirstpublished":"2005-10-19T14:18:17Z","dateupdated":"2006-01-18T18:03:42Z","revision":40,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"14","cam_exploitation":"15","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"62.4375","cam_scorecurrentwidelyknown":"72.5625","cam_scorecurrentwidelyknownexploited":"81","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":62.4375,"vulnote":null}