SB2021072133 - Multiple vulnerabilities in Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Published: July 21, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2018-15686)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to an error in unit_deserialize of systemd. A remote attacker can supply arbitrary state across systemd re-execution via NotifyAccess and gain root privileges.
2) Input validation error (CVE-ID: CVE-2020-7733)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
3) Improper input validation (CVE-ID: CVE-2019-10746)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Configuration (Kibana) component in Oracle Communications Cloud Native Core Network Function Cloud Native Environment. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.