{"vuid":"VU#613562","idnumber":"613562","name":"Oracle products contain multiple vulnerabilities","keywords":["Oracle Database","Database Server","Collaboration Suite","E-Business Suite and Applications","Enterprise Manager","Enterprise Manager Grid Control","PeopleSoft EnterpriseOne","PeopleSoft OneWorldXe","oracle_cpu_july_2005"],"overview":"Multiple vulnerabilities exist in numerous Oracle products. The impacts of these vulnerabilities are varied and may include remote execution of arbitrary code, the disclosure of sensitive information, and  denial-of-service conditions","clean_desc":"Multiple vulnerabilities exist in numerous Oracle products including: Oracle Database Server\nOracle Database\nOracle Application Server\nOracle Collaboration Suite\nOracle E-Business Suite and Applications\nOracle Enterprise Manager Grid Control\nOracle Enterprise Manager 10g Database Control\nOracle Developer Suite\nOracle Express Server\nOracle JInitiator\nOracle Forms and Reports\nOracle Workflow\nThe specific details of these vulnerabilities are not clear. For more information concerning vulnerabilities, the conditions necessary to exploit them, and the patches Oracle has released to correct them, please refer to the Oracle Critical Patch Update for July 2005.","impact":"The complete impact of these issues vary depending on the particular application and vulnerability being attacked. Potential consequences may include the remote execution of arbitrary code, disclosure of sensitive information, and denial-of-service conditions. Database compromises may result in the disclosure of sensitive personal information, such as credit card numbers, social security numbers, and health and patient information.","resolution":"Apply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for July 2005.","workarounds":"","sysaffected":"","thanks":"This document is based on information contained in the \nOracle Critical Patch Update for July 2005 Oracle credits the following parties for providing information regarding these vulnerabilities: Gerhard Eschelbeck of Qualys, Inc., Esteban Martínez Fayó of Application Security, Inc., Alexander Kornbrust of Red Database Security, Stephen Kost of Integrigy, David Litchfield of NGSS Limited, Michael Murray of nCircle Network Security, Aaron C. Newman of Application Security, Inc., Mike Sues of Rigel Kent Security.","author":"This document was written by Jeff Gennari.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html","http://www.oracle.com/technology/deploy/security/alerts.htm"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-07-13T15:52:14Z","publicdate":"2005-07-12T00:00:00Z","datefirstpublished":"2005-07-13T19:36:26Z","dateupdated":"2005-10-19T13:05:59Z","revision":26,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"17","cam_impact":"19","cam_easeofexploitation":"18","cam_attackeraccessrequired":"17","cam_scorecurrent":"55.596375","cam_scorecurrentwidelyknown":"64.8624375","cam_scorecurrentwidelyknownexploited":"101.9266875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":55.596375,"vulnote":null}