{"vuid":"VU#376756","idnumber":"376756","name":"Oracle Application Server Internet Directory vulnerability","keywords":["Oracle Application Server","Oracle Internet Directory","AS07","oracle_cpu_October_2005","Oracle CPU October 2005"],"overview":"An unspecified vulnerability in the Oracle Internet Directory may allow a remote, unauthenticated attacker to compromise system confidentiality and integrity.","clean_desc":"Oracle Internet Directory provides directory services, such as LDAP support, for the Oracle Application Server. There is an vulnerability in the Oracle Internet Directory. The details of this vulnerability are not clear. However, Oracle states this issue can allow an attacker to easily compromise system confidentiality and integrity. This issue is identified as AS07 in the Oracle Critical Patch Update for October 2005.","impact":"A remote, unauthenticated attacker may be able gain access to and modify sensitive information.","resolution":"Apply updates \nApply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005.","workarounds":"Limit Access to Oracle Internet Directory Block or restrict access to the Oracle Internet Directory on affected systems from untrusted networks such as the Internet. Sites, particularly those who are not able to apply the appropriate patches, are encouraged to consider implementing this workaround.","sysaffected":"","thanks":"This document is based on information contained in the \nOracle Critical Patch Update for October 2005","author":"This document was written by Jeff Gennari.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html","http://secunia.com/advisories/17250/","http://www.red-database-security.com/advisory/details_oracle_cpu_october"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-19T14:12:32Z","publicdate":"2005-10-18T00:00:00Z","datefirstpublished":"2005-10-21T15:18:29Z","dateupdated":"2005-10-21T17:50:39Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.2125","cam_scorecurrentwidelyknown":"23.90625","cam_scorecurrentwidelyknownexploited":"43.03125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.2125,"vulnote":null}