Skip to main content

Oracle Products Multiple Vulnerabilities

Last Update Date: 21 Jan 2015 10:39 Release Date: 21 Jan 2015 3439 Views

RISK: High Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

Multiple vulnerabilities were identified in Oracle Products.

  • Multiple vulnerabilities were identified in Oracle Fusion Middleware. A remote user can gain elevated privileges, partially access and modify data on the target system. A remote or local user can cause partial denial of service conditions.
  • Several vulnerabilities were identified in Oracle WebLogic. A remote user can cause partial denial of service conditions, partially access and partially modify data on the target system.
  • Multiple vulnerabilities were identified in Oracle Database. A remote authenticated user can gain elevated privileges, access data and partially modify data on the target system, and cause denial of service conditions.
  • Multiple vulnerabilities were identified in Oracle Java SE. A remote or local user can obtain elevated privileges, partially access and modify data on the target system, cause partial denial of service conditions.
  • Multiple vulnerabilities were identified in Oracle Solaris. A remote authenticated or local user can obtain elevated privileges on the target system. A remote user can partially access data and cause partial denial of service conditions. A local user can cause denial of service conditions. A remote or local user can partially access and modify data on the target system.

Impact

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure
  • Data Manipulation

System / Technologies affected

  • Oracle Fusion Middleware, version(s) 10.1.3.5, 11.1.1.7, 11.1.2.1, 11.1.2.2, 12.1.2, 12.1.3
  • Oracle WebLogic Server, version(s) 10.0.2.0, 10.3.6.0, 12.1.1.0, 12.1.2.0, 12.1.3.0
  • Oracle Database Server, version(s) 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2
  • Oracle Java SE, version(s) 5.0u75, 6u85, 7u72, 8u25
  • Solaris, version(s) 10, 11

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link