Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-3639 CVE-2017-0861 |
CWE-ID | CWE-362 CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Oracle Communications LSMS Server applications / Other server solutions |
Vendor | Oracle |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU12911
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3639
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to race conditions in CPU cache processing. A local attacker can conduct a side-channel attack to exploit a flaw in the speculative execution of Load and Store instructions to read privileged memory.
Note: the vulnerability is referred to as "Spectre variant 4".
Install update from vendor's website.
Vulnerable software versionsOracle Communications LSMS: 13.0 - 13.3
CPE2.3 External linkshttp://www.oracle.com/security-alerts/cpujul2020.html?904648
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU10885
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2017-0861
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to use-after-free error. A local attacker can trigger memory corruption and cause the service to crash or execute arbitrary code.
Install update from vendor's website.
Vulnerable software versionsOracle Communications LSMS: 13.0 - 13.3
CPE2.3 External linkshttp://www.oracle.com/security-alerts/cpujul2020.html?904648
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?