SB20190716146 - Multiple vulnerabilities in Oracle Clusterware



SB20190716146 - Multiple vulnerabilities in Oracle Clusterware

Published: July 16, 2019

Security Bulletin ID SB20190716146
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2019-2860)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Trace File Analyzer (TFA) Collector component in Oracle Clusterware. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


2) Input validation error (CVE-ID: CVE-2018-1000873)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into deserializing of crafted input with specifically very large values in the nanoseconds field of a time value and cause the service to crash.

3) Deserialization of Untrusted Data (CVE-ID: CVE-2018-12022)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists when Default Typing is enabled and the service has the Jodd-db jar in the classpath. A remote attacker can provide an LDAP service to access and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.