CERTA-2009-AVI-279
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance.

Description

Un grand nombre de vulnérabilités a été découvert dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance pour certaines.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle Weblogic Oracle WebLogic Server 8.1 à 8.1 SP6 ;
Oracle N/A Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ;
Oracle N/A Oracle E-Business Suite Release 12, version 12.0.6 ;
Oracle Weblogic Oracle WebLogic Server 10.3, 10.0MP1 ;
Oracle N/A Oracle E-Business Suite Release 11i, version 11.5.10.2 ;
Oracle Weblogic Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 à 9.2 MP3 ;
Oracle N/A Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ;
Oracle N/A Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ;
Oracle N/A Oracle E-Business Suite Release 12, version 12.1 ;
Oracle N/A Oracle Database 10g, version 10.1.0.5 ;
Oracle N/A Oracle JRockit R27.6.3 et les versions précédentes (JDK/JRE 6, 5, 1.4.2).
Oracle PeopleSoft PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ;
Oracle N/A Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ;
Oracle N/A Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ;
Oracle N/A Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;
Oracle N/A Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ;
Oracle N/A Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ;
Oracle PeopleSoft PeopleSoft Enterprise PeopleTools version 8.49 ;
Oracle N/A Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ;
Oracle Weblogic Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ;
Oracle Weblogic Oracle WebLogic Server 7.0 à 7.0 SP7 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle WebLogic Server 8.1 \u00e0 8.1 SP6 ;",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle E-Business Suite Release 12, version 12.0.6 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle WebLogic Server 10.3, 10.0MP1 ;",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle E-Business Suite Release 11i, version 11.5.10.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 \u00e0 9.2 MP3 ;",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle E-Business Suite Release 12, version 12.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 10g, version 10.1.0.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle JRockit R27.6.3 et les versions pr\u00e9c\u00e9dentes (JDK/JRE 6, 5, 1.4.2).",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "PeopleSoft Enterprise PeopleTools version 8.49 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ;",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle WebLogic Server 7.0 \u00e0 7.0 SP7 ;",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUn grand nombre de vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 d\u00e9couvert dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance\npour certaines.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-1019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1019"
    },
    {
      "name": "CVE-2009-1978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1978"
    },
    {
      "name": "CVE-2009-1969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1969"
    },
    {
      "name": "CVE-2009-1976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1976"
    },
    {
      "name": "CVE-2009-1987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1987"
    },
    {
      "name": "CVE-2009-1966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1966"
    },
    {
      "name": "CVE-2009-1970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1970"
    },
    {
      "name": "CVE-2009-1988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1988"
    },
    {
      "name": "CVE-2009-1968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1968"
    },
    {
      "name": "CVE-2009-1974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1974"
    },
    {
      "name": "CVE-2009-1983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1983"
    },
    {
      "name": "CVE-2009-1094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
    },
    {
      "name": "CVE-2009-1020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1020"
    },
    {
      "name": "CVE-2009-1015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1015"
    },
    {
      "name": "CVE-2009-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1975"
    },
    {
      "name": "CVE-2009-1973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1973"
    },
    {
      "name": "CVE-2009-1977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1977"
    },
    {
      "name": "CVE-2009-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
    },
    {
      "name": "CVE-2009-1967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1967"
    },
    {
      "name": "CVE-2009-1982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1982"
    },
    {
      "name": "CVE-2009-0987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0987"
    },
    {
      "name": "CVE-2009-1986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1986"
    },
    {
      "name": "CVE-2009-1963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1963"
    },
    {
      "name": "CVE-2009-1021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1021"
    },
    {
      "name": "CVE-2009-1984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1984"
    },
    {
      "name": "CVE-2009-1989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1989"
    },
    {
      "name": "CVE-2009-1981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1981"
    },
    {
      "name": "CVE-2009-1980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1980"
    },
    {
      "name": "CVE-2009-1523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1523"
    }
  ],
  "initial_release_date": "2009-07-15T00:00:00",
  "last_revision_date": "2009-07-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle de Juillet 2009 :",
      "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html"
    }
  ],
  "reference": "CERTA-2009-AVI-279",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans des produits Oracle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle de juillet 2009",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…