{"vuid":"VU#545804","idnumber":"545804","name":"Oracle products contain multiple vulnerabilities","keywords":["Oracle","Oracle CPU January 2006","oracle_cpu_january_2006","database","application server","peoplesoft"],"overview":"Multiple vulnerabilities exist in numerous Oracle products. The severity and impacts of these vulnerabilities are varied and may include remote execution of arbitrary code, the disclosure of sensitive information, and denial-of-service conditions.","clean_desc":"Multiple vulnerabilities exist in numerous Oracle products including: Oracle Database 10g\n\tOracle9i Database\n\tOracle8i Database\n\tOracle Enterprise Manager 10g Grid Control\n\tOracle Application Server 10g\n\tOracle9i Application Server\n\tOracle Collaboration Suite 10g\n\tOracle9i Collaboration Suite\n\tOracle E-Business Suite Release 11i\n\tOracle E-Business Suite Release 11.0\n\tJD Edwards EnterpriseOne, OneWorld Tools\n\tPeopleSoft Enterprise Portal\n\tOracle Workflow The specific details of these vulnerabilities are unavailable. For more information concerning vulnerabilities, the conditions necessary to exploit them, and the patches Oracle has released to correct them, please refer to the Oracle Critical Patch Update for January 2006.","impact":"The complete impact of these issues varies depending on the particular application and vulnerability being attacked. Potential consequences may include the remote execution of arbitrary code, disclosure of sensitive information, and denial-of-service conditions. Database compromises may result in the disclosure of sensitive personal information, such as credit card numbers, social security numbers, and health and patient information.","resolution":"Apply patches\nApply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for January 2006.","workarounds":"","sysaffected":"","thanks":"These vulnerabilities were reported in e \nOracle Critical Patch Update for January 2006 Oracle credits the following individuals with  providing information regarding these issues: Raffaele Amendola; Cesar Cerrudo and Esteban Martinez Fayo of Application Security, Inc.; Joxean Koret; Alexander Kornbrust of Red Database Security GmbH; David Litchfield of Next Generation Security Software Ltd.; Srinivas Nookala of Cenzic, Inc.; Steve Orrin formally of Watchfire, Inc.; Amichai Shulman of Imperva, Inc.","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","o","r","a","c","l","e",".","c","o","m","/","t","e","c","h","n","o","l","o","g","y","/","d","e","p","l","o","y","/","s","e","c","u","r","i","t","y","/","p","d","f","/","c","p","u","j","a","n","2","0","0","6",".","h","t","m","l"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-01-18T16:40:29Z","publicdate":"2006-01-17T00:00:00Z","datefirstpublished":"2006-01-18T20:27:48Z","dateupdated":"2006-01-18T20:29:11Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"17","cam_attackeraccessrequired":"20","cam_scorecurrent":"57.375","cam_scorecurrentwidelyknown":"66.9375","cam_scorecurrentwidelyknownexploited":"105.1875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":57.375,"vulnote":null}