SB2019101586 - Multiple vulnerabilities in Oracle Database Server
Published: October 15, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2019-2940)
The vulnerability allows a local privileged user to manipulate data.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A local privileged user can exploit this vulnerability to manipulate data.
2) Improper input validation (CVE-ID: CVE-2019-2955)
The vulnerability allows a local authenticated user to manipulate or delete data.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A local authenticated user can exploit this vulnerability to manipulate or delete data.
3) Improper input validation (CVE-ID: CVE-2019-2954)
The vulnerability allows a local authenticated user to manipulate or delete data.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A local authenticated user can exploit this vulnerability to manipulate or delete data.
4) Improper input validation (CVE-ID: CVE-2018-11784)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the WLM (Apache Tomcat) in Oracle Database Server. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
5) Improper input validation (CVE-ID: CVE-2019-2734)
The vulnerability allows a remote authenticated user to manipulate data.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A remote authenticated user can exploit this vulnerability to manipulate data.
6) Improper input validation (CVE-ID: CVE-2018-2875)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A remote authenticated user can exploit this vulnerability to gain access to sensitive information.
7) Improper input validation (CVE-ID: CVE-2019-2939)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A remote authenticated user can exploit this vulnerability to gain access to sensitive information.
8) Improper input validation (CVE-ID: CVE-2019-2913)
The vulnerability allows a remote authenticated user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Core RDBMS in Oracle Database Server. A remote authenticated user can exploit this vulnerability to gain access to sensitive information.
9) Improper input validation (CVE-ID: CVE-2019-2956)
The vulnerability allows a remote authenticated user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Core RDBMS (jackson-databind) in Oracle Database Server. A remote authenticated user can exploit this vulnerability to perform a denial of service (DoS) attack.
10) Improper input validation (CVE-ID: CVE-2019-2909)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Java VM in Oracle Database Server. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
Remediation
Install update from vendor's website.