// For flags

CVE-2013-0418

Oracle Outside In CorelDRAW File Parsing Remote Code Execution Vulnerability

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0393. NOTE: the previous information was obtained from the January 2013 CPU. Oracle has not commented on claims from an independent researcher that this is a heap-based buffer overflow in the Paradox database stream filter (vspdx.dll) that can be triggered using a table header with a crafted "number of fields" value.

Una vulnerabilidad no especificada en el componente "Oracle Outside In Technology" de Oracle Fusion Middleware v8.3.7 y v8.4 permite afectar a la disponibilidad a atacantes, dependiendo del contexto, a través de vectores desconocidos relacionados con Outside In Filters. Se trata de una vulnerabilidad diferente a CVE-2013-0393.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Outside In. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of RIFF files. When processing a LIST record, the size field is treated as a signed integer during input validation but is then treated as an unsigned integer when copying data. This can be leveraged by a remote attacker can leverage to gain code execution under the context of the user running the application.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-12-07 CVE Reserved
  • 2013-01-17 CVE Published
  • 2024-02-11 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Exchange Server
Search vendor "Microsoft" for product "Exchange Server"
2007
Search vendor "Microsoft" for product "Exchange Server" and version "2007"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Exchange Server
Search vendor "Microsoft" for product "Exchange Server"
2010
Search vendor "Microsoft" for product "Exchange Server" and version "2010"
sp2
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
8.3.7.0
Search vendor "Oracle" for product "Fusion Middleware" and version "8.3.7.0"
-
Affected
Oracle
Search vendor "Oracle"
Fusion Middleware
Search vendor "Oracle" for product "Fusion Middleware"
8.4
Search vendor "Oracle" for product "Fusion Middleware" and version "8.4"
-
Affected