Vulnerabilities > CVE-2019-2444 - Unspecified vulnerability in Oracle Database 12.1.0.2/12.2.0.1/18C

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
oracle
nessus

Summary

Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Core RDBMS. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

Vulnerable Configurations

Part Description Count
Application
Oracle
3

Nessus

NASL familyDatabases
NASL idORACLE_RDBMS_CPU_JAN_2019.NASL
descriptionThe remote Oracle Database Server is missing the January 2019 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities : - An authenticated remote database takeover vulnerability exists in the Oracle RDBMS. An authenticated, remote attacker with the Create Session, Execute Catalog Role privileges can exploit this via the Oracle Net protocol to take over the back-end database, resulting in the disclosure or manipulation of arbitrary data. (CVE-2019-2406) - An authenticated local database takeover vulnerability exists in the Oracle RDBMS. An authenticated, local attacker with the Local Logon privilege can exploit this, by convincing another user to perform an unspecified action, to take over the back-end database, resulting in the disclosure or manipulation of arbitrary data. (CVE-2019-2444) - A denial of service (DoS) vulnerability exists in the Oracle RDBMS. An authenticated, remote attacker with the Create Session, Create Procedure privileges can exploit this issue, via multiple network protocols, by convincing another use to perform an unspecified action, to cause the Java VM to stop responding. (CVE-2019-2547) Note that Nessus has not tested for these issues but has instead relied only on the application
last seen2020-06-02
modified2019-01-18
plugin id121253
published2019-01-18
reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/121253
titleOracle Database Server Multiple Vulnerabilities (Jan 2019 CPU)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(121253);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/01");

  script_cve_id("CVE-2019-2406", "CVE-2019-2444", "CVE-2019-2547");
  script_bugtraq_id(106584, 106591, 106594);

  script_name(english:"Oracle Database Server Multiple Vulnerabilities (Jan 2019 CPU)");
  script_summary(english:"Checks installed patch info.");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote Oracle Database Server is missing the January 2019
Critical Patch Update (CPU). It is, therefore, affected by multiple
vulnerabilities :

  - An authenticated remote database takeover vulnerability exists in
    the Oracle RDBMS. An authenticated, remote attacker with the
    Create Session, Execute Catalog Role privileges can exploit this
    via the Oracle Net protocol to take over the back-end database,
    resulting in the disclosure or manipulation of arbitrary data.
    (CVE-2019-2406)

  - An authenticated local database takeover vulnerability exists in
    the Oracle RDBMS. An authenticated, local attacker with the Local
    Logon privilege can exploit this, by convincing another user to
    perform an unspecified action, to take over the back-end
    database, resulting in the disclosure or manipulation of
    arbitrary data. (CVE-2019-2444)

  - A denial of service (DoS) vulnerability exists in the Oracle
    RDBMS. An authenticated, remote attacker with the Create Session,
    Create Procedure privileges can exploit this issue, via
    multiple network protocols, by convincing another use to perform
    an unspecified action, to cause the Java VM to stop responding.
    (CVE-2019-2547)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  # https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixDB
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f983335e");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the January 2019 Oracle
Critical Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-2406");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/01/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/01/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/18");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:database_server");
  script_set_attribute(attribute:"agent", value:"all");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("oracle_rdbms_query_patch_info.nbin", "oracle_rdbms_patch_info.nbin");

  exit(0);
}

include("oracle_rdbms_cpu_func.inc");

ipatches = make_nested_array();
# 18.5.0.0
patches["18.5.0.0"]["db"]["nix"] = make_array("patch_level", "18.5.0.0.190115", "CPU", "28822489");
patches["18.5.0.0"]["db"]["win"] = make_array("patch_level", "18.5.0.0.190115", "CPU", "29124511");
# 18.4.1.0
patches["18.4.1.0"]["db"]["nix"] = make_array("patch_level", "18.4.1.0.190115", "CPU", "28822587");
# 18.3.2.0
patches["18.3.2.0"]["db"]["nix"] = make_array("patch_level", "18.3.2.0.190115", "CPU", "28790643");

# RDBMS 12.2.0.1
patches["12.2.0.1"]["db"]["nix"] = make_array("patch_level", "12.2.0.1.190115", "CPU", "28822515, 28790640, 28822638");
patches["12.2.0.1"]["db"]["win"] = make_array("patch_level", "12.2.0.1.190115", "CPU", "28810696");
# RDBMS 12.1.0.2
patches["12.1.0.2"]["db"]["nix"] = make_array("patch_level", "12.1.0.2.190115", "CPU", "28729169, 28731800");
patches["12.1.0.2"]["db"]["win"] = make_array("patch_level", "12.1.0.2.190115", "CPU", "28810679");
# RDBMS 11.2.0.4
patches["11.2.0.4"]["db"]["nix"] = make_array("patch_level", "11.2.0.4.190115", "CPU", "28729262, 28790634");
patches["11.2.0.4"]["db"]["win"] = make_array("patch_level", "11.2.0.4.190115", "CPU", "28761877");

# OJVM 18.5.0.0
patches["18.5.0.0"]["ojvm"]["nix"] = make_array("patch_level", "18.5.0.0.190115", "CPU", "28790647");
# OJVM 12.2.0.1
patches["12.2.0.1"]["ojvm"]["nix"] = make_array("patch_level", "12.2.0.1.190115", "CPU", "28790651");
patches["12.2.0.1"]["ojvm"]["win"] = make_array("patch_level", "12.2.0.1.190115", "CPU", "28994068");
# OJVM 12.1.0.2
patches["12.1.0.2"]["ojvm"]["nix"] = make_array("patch_level", "12.1.0.2.190115", "CPU", "28790654");
patches["12.1.0.2"]["ojvm"]["win"] = make_array("patch_level", "12.1.0.2.190115", "CPU", "28994063");
# OJVM 11.2.0.4
patches["11.2.0.4"]["ojvm"]["nix"] = make_array("patch_level", "11.2.0.4.190115", "CPU", "28790660");
patches["11.2.0.4"]["ojvm"]["win"] = make_array("patch_level", "11.2.0.4.190115", "CPU", "28994059");

check_oracle_database(patches:patches);