CVE-2007-3854

Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.5 allow remote authenticated users to have unknown impact via (1) SYS.DBMS_PRVTAQIS in the Advanced Queuing component (DB02) and (2) MDSYS.MD in the Spatial component (DB12). NOTE: Oracle has not disputed reliable researcher claims that DB02 is for SQL injection and DB12 is for a buffer overflow.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143
http://secunia.com/advisories/26114 Patch Vendor Advisory
http://secunia.com/advisories/26166 Vendor Advisory
http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf
http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html
http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html
http://www.securitytracker.com/id?1018415
http://www.us-cert.gov/cas/techalerts/TA07-200A.html US Government Resource
http://www.vupen.com/english/advisories/2007/2562 Vendor Advisory
http://www.vupen.com/english/advisories/2007/2635 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/35490
https://exchange.xforce.ibmcloud.com/vulnerabilities/35497
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143
http://secunia.com/advisories/26114 Patch Vendor Advisory
http://secunia.com/advisories/26166 Vendor Advisory
http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf
http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html
http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html
http://www.securitytracker.com/id?1018415
http://www.us-cert.gov/cas/techalerts/TA07-200A.html US Government Resource
http://www.vupen.com/english/advisories/2007/2562 Vendor Advisory
http://www.vupen.com/english/advisories/2007/2635 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/35490
https://exchange.xforce.ibmcloud.com/vulnerabilities/35497
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:apex:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:apex:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:apex:2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:apex:2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:1.0.2.2:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:collaboration_suite:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.7:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.8:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:9.2.0.8dv:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.2.0.2:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:10.2.0.3:r2:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:12.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:8.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_customer_relationship_management:9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:8.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management:9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.22:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.47:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.48:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*
cpe:2.3:a:oracle:secure_enterprise_search:10.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:secure_enterprise_search:10.1.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00727143 -
References () http://secunia.com/advisories/26114 - Patch, Vendor Advisory () http://secunia.com/advisories/26114 - Patch, Vendor Advisory
References () http://secunia.com/advisories/26166 - Vendor Advisory () http://secunia.com/advisories/26166 - Vendor Advisory
References () http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf - () http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf -
References () http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html - () http://www.oracle.com/technetwork/topics/security/cpujul2007-087014.html -
References () http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html - () http://www.red-database-security.com/advisory/oracle_cpu_jul_2007.html -
References () http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html - () http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_prvtaqis.html -
References () http://www.securitytracker.com/id?1018415 - () http://www.securitytracker.com/id?1018415 -
References () http://www.us-cert.gov/cas/techalerts/TA07-200A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-200A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2007/2562 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2562 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2007/2635 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2635 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35490 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35490 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35497 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35497 -

Information

Published : 2007-07-18 19:30

Updated : 2024-11-21 00:34


NVD link : CVE-2007-3854

Mitre link : CVE-2007-3854

CVE.ORG link : CVE-2007-3854


JSON object : View

Products Affected

oracle

  • apex
  • database_server
  • e-business_suite
  • peoplesoft_enterprise_human_capital_management
  • peoplesoft_enterprise_peopletools
  • secure_enterprise_search
  • application_server
  • peoplesoft_enterprise_customer_relationship_management
  • collaboration_suite