Vulnerabilities > CVE-2011-2264 - Unspecified vulnerability in Oracle Fusion Middleware 8.3.2.0/8.3.5.0

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
oracle
nessus

Summary

Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows context-dependent attackers to affect confidentiality, integrity, and availability via unknown vectors related to Outside In Filters. NOTE: the previous information was obtained from the July 2011 CPU. Oracle has not commented on claims from a reliable third party that this is a stack-based buffer overflow in the imcdr2.flt library for the CorelDRAW parser.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Nessus

NASL familyWindows
NASL idSYMANTEC_ENTERPRISE_VAULT_SYM11-011.NASL
descriptionThe version of Symantec Enterprise Vault installed on the remote host uses a version of the Oracle Outside In libraries that contain multiple memory corruption vulnerabilities. A remote attacker could exploit these by sending an email with a malicious attachment, which could result in arbitrary code execution when it is processed for archiving.
last seen2020-06-01
modified2020-06-02
plugin id56413
published2011-10-07
reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/56413
titleSymantec Enterprise Vault / Oracle Outside In Multiple Vulnerabilities (SYM11-011)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(56413);
  script_version("1.7");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2011-0794", "CVE-2011-0808", "CVE-2011-2264");
  script_bugtraq_id(47435, 47437, 48766);
  script_xref(name:"CERT", value:"103425");
  script_xref(name:"CERT", value:"520721");

  script_name(english:"Symantec Enterprise Vault / Oracle Outside In Multiple Vulnerabilities (SYM11-011)");
  script_summary(english:"Checks SEV Version");

  script_set_attribute(
    attribute:"synopsis",
    value:
"An archiving application installed on the remote host has multiple
vulnerabilities."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The version of Symantec Enterprise Vault installed on the remote host
uses a version of the Oracle Outside In libraries that contain
multiple memory corruption vulnerabilities.  A remote attacker could
exploit these by sending an email with a malicious attachment, which
could result in arbitrary code execution when it is processed for
archiving."
  );
  # https://support.symantec.com/en_US/article.SYMSA1229.html
  script_set_attribute(attribute:"see_also",value:"http://www.nessus.org/u?8990b82a");
  script_set_attribute(
    attribute:"solution",
    value:
"Apply the relevant hotfix referenced in SYM11-011.  

Note that versions earlier than 8.0.5 must be upgraded to 8.0.5 before
the hotfix can be applied."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"exploithub_sku", value:"EH-11-407");
  script_set_attribute(attribute:"exploit_framework_exploithub", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2011/07/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/09/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/10/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:symantec:enterprise_vault");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");

  script_dependencies("symantec_enterprise_vault_installed.nasl");
  script_require_keys("SMB/enterprise_vault/path", "SMB/enterprise_vault/ver");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");

path = get_kb_item_or_exit("SMB/enterprise_vault/path");
ver = get_kb_item_or_exit("SMB/enterprise_vault/ver");

match = eregmatch(string:ver, pattern:"^([0-9.]+)\.([0-9]+)$");
if (isnull(match))
  exit(1, "Error parsing version ('" + ver + "').");
else
  display_ver = match[1] + ' build ' + match[2];

if (ver_compare(ver:ver, fix:'8.0.5.1076', strict:FALSE) == -1)
  display_fix = '8.0.5 build 1076';
else if (ver =~ "^9\.0\.0\." && ver_compare(ver:ver, fix:'9.0.0.1248', strict:FALSE) == -1)
  display_fix = '9.0.0 build 1248';
else if (ver =~ "^9\.0\.1\." && ver_compare(ver:ver, fix:'9.0.1.1107', strict:FALSE) == -1)
  display_fix = '9.0.1 build 1107';
else if (ver =~ "^9\.0\.2\." && ver_compare(ver:ver, fix:'9.0.2.1175', strict:FALSE) == -1)
  display_fix = '9.0.2 build 1175';
else if (ver =~ "^10\.0\.0\." && ver_compare(ver:ver, fix:'10.0.0.1323', strict:FALSE) == -1)
  display_fix = '10.0.0 build 1323';
else
  exit(0, 'Symantec Enterprise Vault version ' + ver + ' is installed and therefore not affected.');

port = get_kb_item('SMB/transport');

if (report_verbosity > 0)
{
  report = 
    '\n  Path              : ' + path +
    '\n  Installed version : ' + display_ver +
    '\n  Fixed version     : ' + display_fix + '\n';
  security_hole(port:port, extra:report);
}
else security_hole(port);

Saint

bid48766
descriptionOracle Outside In CDR File Parser Stack Buffer Overflow
osvdb73912
titleoracle_outsidein_cdr_parsing_font_size
typeclient