Vulnerability Name: | CVE-2017-10292 (CCN-133726) | ||||||||||||
Assigned: | 2017-10-17 | ||||||||||||
Published: | 2017-10-17 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | Vulnerability in the RDBMS Security component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Create User privilege with logon to the infrastructure where RDBMS Security executes to compromise RDBMS Security. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of RDBMS Security accessible data. CVSS 3.0 Base Score 2.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | ||||||||||||
CVSS v3 Severity: | 2.3 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) 2.0 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
2.0 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 1.7 Low (CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||
Vulnerability Consequences: | Other | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-10292 Source: CCN Type: Oracle CPUOct2017 Oracle Critical Patch Update Advisory - October 2017 Source: CONFIRM Type: Patch, Vendor Advisory http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Source: BID Type: Third Party Advisory, VDB Entry 101350 Source: CCN Type: BID-101350 Oracle Database Server CVE-2017-10292 Local Security Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039591 Source: XF Type: UNKNOWN oracle-cpuoct2017-cve201710292(133726) Source: CCN Type: IBM Security Bulletin 6454587 (Security Identity Manager) Security vulnerabilities have been fixed in IBM Security Identity Manager Virtual Appliance | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |