Multiple stack-based buffer overflows in the Oracle JInitiator ActiveX control (beans.ocx) 1.1.8.16 and earlier, as used by Oracle Forms applications from Oracle and third parties, allow remote attackers to execute arbitrary code via unspecified "initialization parameters." NOTE: it was later reported that 1.1.8.3 through 1.1.8.25, and probably 1.1.5.x and 1.1.7.x, are affected.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/37711 - | |
References | () http://secunia.com/advisories/26644 - Vendor Advisory | |
References | () http://securitytracker.com/id?1018618 - | |
References | () http://www.integrigy.com/security-resources/analysis/integrigy-oracle-jinitiator-vulnerability.pdf - | |
References | () http://www.kb.cert.org/vuls/id/474433 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/479186/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/25473 - | |
References | () http://www.vupen.com/english/advisories/2007/3007 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36310 - |
Information
Published : 2007-08-31 00:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4467
Mitre link : CVE-2007-4467
CVE.ORG link : CVE-2007-4467
JSON object : View
Products Affected
oracle
- jinitiator
CWE
CWE-20
Improper Input Validation