SB2017071815 - Multiple vulnerability in Oracle products
Published: July 18, 2017 Updated: September 5, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Arbitrary code execution (CVE-ID: CVE-2017-10125)
The vulnerability allows an attacker with physical access to the system to execute arbitrary code on the target system.The weakness exists due to unknown error. A remote attacker can execute arbitrary code with elevated privileges and compromise the vulnerable system.
2) Information disclosure (CVE-ID: CVE-2017-10243)
The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.The weakness exists due to unknown error. A remote attacker can disclose arbitrary files or cause the application to crash.
3) Remote code execution (CVE-ID: CVE-2017-10116)
The vulnerability allows a remote authenticated attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
4) Information disclosure (CVE-ID: CVE-2017-10115)
The vulnerability allows a remote attacker to obtain potentially sensitive information.The weakness exists due to unknown error. A remote attacker can disclose important data on the target system
5) Remote code execution (CVE-ID: CVE-2017-10110)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take control over the affected system.
6) Denial of service (CVE-ID: CVE-2017-10109)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to unknown error. A remote attacker can cause the application to crash.
7) Denial of service (CVE-ID: CVE-2017-10108)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to unknown error. A remote attacker can cause the application to crash.
8) Remote code execution (CVE-ID: CVE-2017-10107)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
9) Security restrictions bypass (CVE-ID: CVE-2017-10105)
The vulnerability allows a remote attacker to bypass security restrictions.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and modify arbitrary data on the system.
10) Remote code execution (CVE-ID: CVE-2017-10102)
The vulnerability allows a remote authenticated attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
11) Remote code execution (CVE-ID: CVE-2017-10101)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
12) Remote code execution (CVE-ID: CVE-2017-10096)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
13) Remote code execution (CVE-ID: CVE-2017-10090)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
14) Remote code execution (CVE-ID: CVE-2017-10089)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
15) Remote code execution (CVE-ID: CVE-2017-10087)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, execute arbitrary code with elevated privileges and take full control over the system.
16) Security restrictions bypass (CVE-ID: CVE-2017-10078)
The vulnerability allows a remote attacker to bypass security restrictions.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website, bypass security restrictions and disclose and modify important data on the system.
17) Privilege escalation (CVE-ID: CVE-2017-10067)
The vulnerability allows a remote authenticated attacker to gain elevated privileges.The weakness exists due to unknown error. A remote attacker can trick the victim into visiting a specially crafted website and gain privileged access to the system.
18) Denial of service (CVE-ID: CVE-2017-10053)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to unknown error. A remote attacker can cause the application to crash.
Remediation
Install update from vendor's website.