SB2020011452 - Multiple vulnerabilities in Oracle Communications Interactive Session Recorder



SB2020011452 - Multiple vulnerabilities in Oracle Communications Interactive Session Recorder

Published: January 14, 2020 Updated: March 6, 2024

Security Bulletin ID SB2020011452
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2018-6829)

The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists in the cipher/elgamal.c source code due to insufficient encryption. A remote attacker can access improperly coded plaintexts.

2) Security restrictions bypass (CVE-ID: CVE-2018-16395)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists in OpenSSL::X509::Name due to the equality check is not correct if the value of an entity of the argument (right-hand side) starts with the value of the receiver (left-hand side). A remote attacker can supply malicious X.509 certificate to be passed and bypass security restrictions to conduct further attacks.

3) Prototype pollution (CVE-ID: CVE-2019-11358)

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.


Remediation

Install update from vendor's website.