SB2021042102 - Multiple vulnerabilities in Oracle Database Server
Published: April 21, 2021 Updated: February 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2021-2207)
The vulnerability allows a local privileged user to manipulate data.
The vulnerability exists due to improper input validation within the Oracle Database - Enterprise Edition in Oracle Database Server. A local privileged user can exploit this vulnerability to manipulate data.
2) Improper input validation (CVE-ID: CVE-2021-2245)
The vulnerability allows a remote privileged user to manipulate data.
The vulnerability exists due to improper input validation within the Oracle Database - Enterprise Edition Unified Audit in Oracle Database Server. A remote privileged user can exploit this vulnerability to manipulate data.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-2175)
The vulnerability allows a remote privileged user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Database Vault in Oracle Database Server. A remote privileged user can exploit this vulnerability to gain access to sensitive information.
4) Improper input validation (CVE-ID: CVE-2021-2173)
The vulnerability allows a remote privileged user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Recovery in Oracle Database Server. A remote privileged user can exploit this vulnerability to gain access to sensitive information.
5) Improper input validation (CVE-ID: CVE-2021-2234)
The vulnerability allows a remote authenticated user to manipulate data.
The vulnerability exists due to improper input validation within the Java VM in Oracle Database Server. A remote authenticated user can exploit this vulnerability to manipulate data.
6) Improper input validation (CVE-ID: CVE-2019-3740)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Comp Management and Life Cycle Management (RSA BSAFE Crypto-J) component in Application Performance Management (APM). A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
7) Resource management error (CVE-ID: CVE-2020-17527)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper management of internal resources within the application when processing HTTP/2 requests in Apache Tomcat. The web server can re-use an HTTP request header value from the previous stream received on an
HTTP/2 connection for the request associated with the subsequent stream. As a result a remote attacker can obtain sensitive information from another HTTP request.
8) Improper input validation (CVE-ID: CVE-2020-5360)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Oracle Database - Enterprise Edition Security (Dell BSAFE Micro Edition Suite) in Oracle Database Server. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.