CVE-2007-5507
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The GIOP service in TNS Listener in the Oracle Net Services component in Oracle Database 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote attackers to cause a denial of service (crash) or read potentially sensitive memory via a connect GIOP packet with an invalid data size, which triggers a buffer over-read, aka DB22.
El servicio GIOP en TNS Listener del componente Oracle Net Services de Oracle Database 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, y 10.2.0.3 permite a atacantes remotos provocar una denegación de servicio (caída) o leer memoria potencialmente sensible mediante un paquete GIOP connect con un tamaño de datos inválido, lo cual dispara un desbordamiento de lectura de búfer, también conocida como DB22.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-10-17 CVE Reserved
- 2007-10-17 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/27409 | Third Party Advisory | |
http://securityreason.com/securityalert/3250 | Third Party Advisory | |
http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener | X_refsource_misc | |
http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/482423/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/26103 | Vdb Entry | |
http://www.securitytracker.com/id?1018823 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA07-290A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2007/3524 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/3626 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=119332677525918&w=2 | 2018-10-15 | |
http://secunia.com/advisories/27251 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Database Server Search vendor "Oracle" for product "Database Server" | 9.0.1.5 Search vendor "Oracle" for product "Database Server" and version "9.0.1.5" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Server Search vendor "Oracle" for product "Database Server" | 9.2.0.8 Search vendor "Oracle" for product "Database Server" and version "9.2.0.8" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Server Search vendor "Oracle" for product "Database Server" | 9.2.0.8dv Search vendor "Oracle" for product "Database Server" and version "9.2.0.8dv" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Server Search vendor "Oracle" for product "Database Server" | 10.1.0.5 Search vendor "Oracle" for product "Database Server" and version "10.1.0.5" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Server Search vendor "Oracle" for product "Database Server" | 10.2.0.3 Search vendor "Oracle" for product "Database Server" and version "10.2.0.3" | - |
Affected
|