{"vuid":"VU#890940","idnumber":"890940","name":"Oracle HTTP Server vulnerability","keywords":["Oracle Database Server","Oracle HTTP Server","DB31","AS05","oracle_cpu_October_2005","Oracle CPU October 2005"],"overview":"An unspecified vulnerability in Oracle's HTTP Server (Apache) may allow a remote, unauthenticated attacker to compromise system confidentiality, integrity, and availability.","clean_desc":"Oracle Application Server and Database Server includes Apache as an HTTP server. There is an vulnerability in the version of Apache that ships with Oracle Database and Application Server. The details of this vulnerability are not clear. However, Oracle states this issue can allow an attacker to easily compromise system integrity and availability. In addition, system confidentiality may be at risk, however Oracle specifies that compromising confidentiality as difficult. This issue is identified as DB31/AS05 in the Oracle Critical Patch Update for October 2005.","impact":"A remote, unauthenticated attacker may be able to gain access to and modify sensitive information, or cause a denial-of-service condition.","resolution":"Apply updates \nApply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005.","workarounds":"Limit Access to HTTP Server Block or restrict access to the HTTP server (80/tcp) on affected systems from untrusted networks such as the Internet. Sites, particularly those not able to apply the appropriate patches, are encouraged to consider implementing this workaround.","sysaffected":"","thanks":"This document is based on information contained in the \nOracle Critical Patch Update for October 2005","author":"This document was written by Jeff Gennari.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html","http://secunia.com/advisories/17250/","http://www.red-database-security.com/advisory/details_oracle_cpu_october"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-19T14:12:35Z","publicdate":"2005-10-18T00:00:00Z","datefirstpublished":"2005-10-21T14:59:06Z","dateupdated":"2005-10-21T17:50:55Z","revision":22,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.2125","cam_scorecurrentwidelyknown":"23.90625","cam_scorecurrentwidelyknownexploited":"43.03125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.2125,"vulnote":null}