CERTA-2003-AVI-191

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité présente dans Oracle Files permet à un utilisateur mal intentionné d'accéder à des fichiers protégés.

Description

Oracle Files est un composant livré avec Oracle Collaboration Suite. Oracle Files est un outil de gestion collaborative de fichiers.

Une vulnérabilité dans Oracle Files permet l'accès à des fichiers non autorisés.

Solution

Appliquer le correctif disponible correspondant à votre plate-forme (cf section documentation).

None
Impacted products
Vendor Product Description
Oracle N/A Oracle Files Release 9.0.3.1.x
Oracle N/A Oracle Files Release 9.0.3.2.0
Oracle N/A Oracle Files Release 9.0.3.3.x
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Files Release 9.0.3.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Files Release 9.0.3.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Files Release 9.0.3.3.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nOracle Files est un composant livr\u00e9 avec Oracle Collaboration Suite.\nOracle Files est un outil de gestion collaborative de fichiers.\n\nUne vuln\u00e9rabilit\u00e9 dans Oracle Files permet l\u0027acc\u00e8s \u00e0 des fichiers non\nautoris\u00e9s.\n\n## Solution\n\nAppliquer le correctif disponible correspondant \u00e0 votre plate-forme (cf\nsection documentation).\n",
  "cves": [],
  "links": [
    {
      "title": "Correctif disponible \u00e0 l\u0027adresse suivante avec le num\u00e9ro    3036419 :",
      "url": "http://metalink.oracle.com"
    }
  ],
  "reference": "CERTA-2003-AVI-191",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-11-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Diffusion d\u0027informations"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Oracle Files permet \u00e0 un utilisateur mal\nintentionn\u00e9 d\u0027acc\u00e9der \u00e0 des fichiers prot\u00e9g\u00e9s.\n",
  "title": "Vuln\u00e9rabilit\u00e9 sur Oracle Files",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 60 d\u0027oracle",
      "url": "http://otn.oracle.com/deploy/security/pdf/2003alert60.pdf"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…