SB2021072133 - Multiple vulnerabilities in Oracle Communications Cloud Native Core Network Function Cloud Native Environment 



SB2021072133 - Multiple vulnerabilities in Oracle Communications Cloud Native Core Network Function Cloud Native Environment

Published: July 21, 2021

Security Bulletin ID SB2021072133
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2018-15686)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to an error in unit_deserialize of systemd. A remote attacker can supply arbitrary state across systemd re-execution via NotifyAccess and gain root privileges.


2) Input validation error (CVE-ID: CVE-2020-7733)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.


3) Improper input validation (CVE-ID: CVE-2019-10746)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Configuration (Kibana) component in Oracle Communications Cloud Native Core Network Function Cloud Native Environment. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.