SB2020011452 - Multiple vulnerabilities in Oracle Communications Interactive Session Recorder
Published: January 14, 2020 Updated: March 6, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-6829)
The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.The weakness exists in the cipher/elgamal.c source code due to insufficient encryption. A remote attacker can access improperly coded plaintexts.
2) Security restrictions bypass (CVE-ID: CVE-2018-16395)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists in OpenSSL::X509::Name due to the equality check is not correct if the value of an entity of the argument (right-hand side) starts with the value of the receiver (left-hand side). A remote attacker can supply malicious X.509 certificate to be passed and bypass security restrictions to conduct further attacks.
3) Prototype pollution (CVE-ID: CVE-2019-11358)
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Remediation
Install update from vendor's website.