CVE-2008-5440
Oracle TimesTen evtdump Remote Format String Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in the TimesTen Data Server component in Oracle Database 7.0.5.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this is a format string vulnerability via the msg parameter in the evtdump CGI module.
Una vulnerabilidad no especificada en el componente TimesTen Data Server de Oracle Database versión 7.0.5.0.0.0, permite a los atacantes remotos afectar a la confidencialidad, integridad y disponibilidad por medio de vectores desconocidos. NOTA: la información anterior fue obtenida de la CPU de enero de 2009. Oracle no ha comentado sobre las afirmaciones de investigadores confiables de que se trata de una vulnerabilidad de cadena de formato por medio del parámetro msg en el módulo CGI de evtdump.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle TimesTen. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the evtdump CGI module, which is used to write to an internal log file. The parameter 'msg' does not properly sanitize format string tokens and can be exploited to execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-12-11 CVE Reserved
- 2009-01-14 CVE Published
- 2023-04-18 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://joxeankoret.com/blog/?p=41 | X_refsource_misc | |
http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/500078/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/500080/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/33177 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-09-004 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/33525 | 2018-10-11 | |
http://www.vupen.com/english/advisories/2009/0115 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Timesten In-memory Database Search vendor "Oracle" for product "Timesten In-memory Database" | 7.0.5.0.0 Search vendor "Oracle" for product "Timesten In-memory Database" and version "7.0.5.0.0" | - |
Affected
|