Vulnerabilities > CVE-2014-2468 - Remote Security vulnerability in Oracle Siebel CRM 8.1.1/8.2.2

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
oracle
nessus

Summary

Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect integrity via vectors related to Open_UI, a different vulnerability than CVE-2014-4230.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Nessus

NASL familyWindows
NASL idORACLE_SIEBEL_SERVER_APR_2014_CPU.NASL
descriptionThe remote Oracle Siebel install has an unspecified remote vulnerability in the UI Framework component that affects integrity.
last seen2020-06-01
modified2020-06-02
plugin id74467
published2014-06-11
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/74467
titleOracle Siebel UI Framework CVE-2014-2468 Remote Security Vulnerability (April 2014 CPU)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(74467);
  script_version("1.3");
  script_cvs_date("Date: 2018/07/18 17:43:58");

  script_cve_id("CVE-2014-2468");
  script_bugtraq_id(66848);

  script_name(english:"Oracle Siebel UI Framework CVE-2014-2468 Remote Security Vulnerability (April 2014 CPU)");
  script_summary(english:"Checks version of Siebel Server.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by an unspecified remote vulnerability
affecting integrity.");
  script_set_attribute(attribute:"description", value:
"The remote Oracle Siebel install has an unspecified remote
vulnerability in the UI Framework component that affects integrity.");
  # http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ef1fc2a6");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the April 2014 Oracle
Critical Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/15");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/04/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:siebel_crm");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("oracle_siebel_server_installed.nbin");
  script_require_keys("Oracle/siebel_server/Installed");
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

get_kb_item_or_exit("Oracle/siebel_server/Installed");
app_name = "Oracle Siebel Server";

report = "";
affected = 0;
not_affected = make_list();

# Get installs.
installs = get_kb_list("Oracle/siebel_server/*/Version");

# Verify that each install is patched.
foreach install (keys(installs))
{
  version = installs[install];
  subdir = install - 'Oracle/siebel_server/' - '/Version';

  patched = FALSE;
  fix = NULL;

  if (version =~ "^8\.1\.1\.")
  {
    fix = "811117";
    fix_ver = "8.1.1.11.7";
  }
  else if (version =~ "^8\.2\.2\.")
  {
    fix = "82247";
    fix_ver = "8.2.2.4.7";
  }

  else not_affected = make_list(not_affected, version);
  if (isnull(fix)) continue;

  # patch set check
  if (!isnull(fix_ver))
  {
    if (ver_compare(ver:version, fix:fix_ver, strict:FALSE) >= 0)
      patched = TRUE;
  }

  if (!patched)
  {
    if (!isnull(subdir))
      report += '\n  Install path   : ' + subdir;

    report +=
      '\n  Version        : ' + version +
      '\n  Required patch : ' + fix +
      '\n';

    affected++;
  }
  else not_affected = make_list(not_affected, version);
}

if (affected)
{
  port = 0;
  if (report_verbosity > 0)
  {
    report = affected + ' of ' + max_index(keys(installs)) + ' installs affected :\n' + report;
    security_warning(extra:report, port:port);
  }
  else security_warning(port);
  exit(0);
}
else audit(AUDIT_INST_VER_NOT_VULN, app_name, not_affected);