CERTA-2005-AVI-424

Vulnerability from certfr_avis - Published: 2005-10-26 - Updated: 2005-10-26

De multiples vulnérabilités sont présentes dans les produits Oracle pour HP OpenView.

Description

Oracle pour HP OpenView est, comme son nom l'indique, un serveur Oracle adjoint au produit OpenView de HP. A ce titre, il comporte les mêmes failles que celles décrites dans l'avis CERTA-2005-AVI-414 concernant la version standard d'Oracle. Il est donc possible pour un utilisateur distant mal intentionné de provoquer un déni de service, d'exécuter du code arbitraire, de contourner la politique de sécurité du système ou de réaliser des attaques de type cross-site scripting.

Solution

Pour obtenir les actions correctrices à appliquer, se réferer au bulletin de sécurité de l'éditeur (cf. Documentation).

None
Impacted products
Vendor Product Description
Oracle N/A Oracle pour HP OpenView 9.x.
Oracle N/A Oracle pour HP OpenView 8.x ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle pour HP OpenView 9.x.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle pour HP OpenView 8.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nOracle pour HP OpenView est, comme son nom l\u0027indique, un serveur Oracle\nadjoint au produit OpenView de HP. A ce titre, il comporte les m\u00eames\nfailles que celles d\u00e9crites dans l\u0027avis CERTA-2005-AVI-414 concernant la\nversion standard d\u0027Oracle. Il est donc possible pour un utilisateur\ndistant mal intentionn\u00e9 de provoquer un d\u00e9ni de service, d\u0027ex\u00e9cuter du\ncode arbitraire, de contourner la politique de s\u00e9curit\u00e9 du syst\u00e8me ou de\nr\u00e9aliser des attaques de type cross-site scripting.\n\n## Solution\n\nPour obtenir les actions correctrices \u00e0 appliquer, se r\u00e9ferer au\nbulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-10-26T00:00:00",
  "last_revision_date": "2005-10-26T00:00:00",
  "links": [
    {
      "title": "Site de Oracle :",
      "url": "http://www.oracle.com"
    },
    {
      "title": "Avis CERTA-2005-AVI-414 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2005-AVI-414/CERTA-2005-AVI-414.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de HP HPSBMA012345 du 24 octobre 2005    :",
      "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA012345"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 d\u0027Oracle et guide de mise \u00e0 jour:",
      "url": "http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html"
    },
    {
      "title": "Site de l\u0027\u00e9diteur :",
      "url": "http://www.hp.com"
    }
  ],
  "reference": "CERTA-2005-AVI-424",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-10-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Cross-site scripting"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Injection de requ\u00eates SQL"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Ex\u00e9cution de commandes arbitraires en local ou \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits Oracle pour\nHP OpenView.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Oracle pour HP Openview",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA01235 du 24 octobre 2005",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…