CVE-2017-10202
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the OJVM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise OJVM. While the vulnerability is in OJVM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of OJVM. Note: This score is for Windows platforms. On non-Windows platforms Scope is Unchanged, giving a CVSS Base Score of 8.8. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
Vulnerabilidad en el componente OJVM de Oracle Database Server. Las versiones compatibles que se han visto afectadas son la 11.2.0.4, 12.1.0.2 y la 12.2.0.1. Una vulnerabilidad fácilmente explotable permite que un atacante con un bajo nivel de privilegios y con permisos Create Session y Create Procedure que tenga acceso a red por medio de múltiples protocolos comprometa la seguridad de OJVM. Aunque la vulnerabilidad está presente en OJVM, los ataques podrían afectar seriamente a productos adicionales. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de OJVM. Nota: Esta puntuación es para plataformas Windows. En plataformas distintas a Windows, el alcance no cambia, por lo que se da una puntuación base de CVSS de 8.8. CVSS 3.0 Base Score 9.9 (mpactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2017-06-21 CVE Reserved
- 2017-08-08 CVE Published
- 2023-05-24 EPSS Updated
- 2024-10-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99865 | Third Party Advisory | |
http://www.securitytracker.com/id/1038923 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | 2019-10-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Database Search vendor "Oracle" for product "Database" | 11.2.0.4 Search vendor "Oracle" for product "Database" and version "11.2.0.4" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Search vendor "Oracle" for product "Database" | 12.1.0.2 Search vendor "Oracle" for product "Database" and version "12.1.0.2" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Database Search vendor "Oracle" for product "Database" | 12.2.0.1 Search vendor "Oracle" for product "Database" and version "12.2.0.1" | - |
Affected
|