// For flags

CVE-2010-4416

Oracle GoldenGate Veridata Server XML SOAP Request Parsing Remote Code Execution Vulnerability

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Oracle GoldenGate Veridata component in Oracle Fusion Middleware 3.0.0.4 allows remote attackers to affect availability via unknown vectors related to Server. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party researcher that this is a buffer overflow via a crafted XML soap request and a value that does not contain the expected 0x20 terminator character.

Una vulnerabilidad no especificada en el componente Oracle GoldenGate Veridata en Fusion Middleware de Oracle versión 3.0.0.4, permite a los atacantes remotos afectar la disponibilidad por medio de vectores desconocidos relacionados con Server. NOTA: la información anterior fue obtenida de la CPU de enero de 2011. Oracle no ha comentado las afirmaciones de un investigador de terceros confiable de que se trata de un desbordamiento de búfer por medio de una petición SOAP XML especialmente diseñada y un valor que no contiene el carácter de terminador 0x20 previsto.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle GoldenGate Veridata. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the way the application parses an XML soap request used for authorization to the management site. While copying string data from a tag into a buffer, the application will terminate the copy only when the byte being copied is of the value 0x20. By crafting a large enough string without this terminator, an attacker can exploit this to execute remote code under the context of the application.

*Credits: Andrea Micalizzi aka rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-12-06 CVE Reserved
  • 2011-01-18 CVE Published
  • 2023-10-29 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
3.0.0.4
Search vendor "Oracle" for product "Fusion Middleware" and version "3.0.0.4"
-
Affected