Vulnerabilities > CVE-2007-2108
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.0.1.5, 9.2.0.8, 10.1.0.5, and 10.2.0.2 on Windows allows remote attackers to have an unknown impact, aka DB01. NOTE: as of 20070424, Oracle has not disputed reliable claims that this issue occurs because the NTLM SSPI AcceptSecurityContext function grants privileges based on the username provided even though all users are authenticated as Guest, which allows remote attackers to gain privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 4 |
Nessus
NASL family | Databases |
NASL id | ORACLE_RDBMS_CPU_APR_2007.NASL |
description | The remote Oracle database server is missing the April 2007 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Adanced Queuing - Advanced Replication - Authentication - Core RDBMS - Oracle Agent - Oracle Data Capture (CDC) - Oracle Instant Client - Oracle Streams - Oracle Text - Oracle Workflow Cartridge - Rules Manager, Expressions Filter - Ultra Search - Upgrade/Downgrade |
last seen | 2020-06-02 |
modified | 2011-11-16 |
plugin id | 56056 |
published | 2011-11-16 |
reporter | This script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/56056 |
title | Oracle Database Multiple Vulnerabilities (April 2007 CPU) |
code |
|
Saint
bid | 23532 |
description | Oracle Database Advanced Replication component DBMS_SNAP_INTERNAL overflow |
id | database_oracle_version |
osvdb | 39933 |
title | oracle_advrep_snap_internal |
type | remote |
References
- http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_April_2007_Analysis.pdf
- http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_April_2007_Analysis.pdf
- http://www.kb.cert.org/vuls/id/809457
- http://www.kb.cert.org/vuls/id/809457
- http://www.ngssoftware.com/papers/database-on-xp.pdf
- http://www.ngssoftware.com/papers/database-on-xp.pdf
- http://www.ngssoftware.com/research/papers/NGSSoftware-OracleCPUAPR2007.pdf
- http://www.ngssoftware.com/research/papers/NGSSoftware-OracleCPUAPR2007.pdf
- http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html
- http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html
- http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html
- http://www.securityfocus.com/archive/1/466329/100/200/threaded
- http://www.securityfocus.com/archive/1/466329/100/200/threaded
- http://www.securityfocus.com/archive/1/466329/100/200/threaded
- http://www.securityfocus.com/archive/1/466329/100/200/threaded
- http://www.securityfocus.com/bid/23532
- http://www.securityfocus.com/bid/23532
- http://www.securitytracker.com/id?1017927
- http://www.securitytracker.com/id?1017927
- http://www.us-cert.gov/cas/techalerts/TA07-108A.html
- http://www.us-cert.gov/cas/techalerts/TA07-108A.html
- http://www.vupen.com/english/advisories/2007/1426
- http://www.vupen.com/english/advisories/2007/1426