SB2019071653 - Multiple vulnerabilities in Oracle Berkeley DB
Published: July 16, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2019-2871)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Data Store in Oracle Berkeley DB. A local non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
2) Improper input validation (CVE-ID: CVE-2019-2870)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Data Store in Oracle Berkeley DB. A local non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
3) Improper input validation (CVE-ID: CVE-2019-2869)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Data Store in Oracle Berkeley DB. A local non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
4) Improper input validation (CVE-ID: CVE-2019-2868)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Data Store in Oracle Berkeley DB. A local non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
5) Improper input validation (CVE-ID: CVE-2019-2760)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Data Store in Oracle Berkeley DB. A local non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
Remediation
Install update from vendor's website.