SB20241015116 - Multiple vulnerabilities in Oracle Database Server
Published: October 15, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2024-21251)
The vulnerability allows a remote authenticated user to manipulate data.
The vulnerability exists due to improper input validation within the Java VM in Oracle Database Server. A remote authenticated user can exploit this vulnerability to manipulate data.
2) Improper input validation (CVE-ID: CVE-2024-21242)
The vulnerability allows a remote authenticated user to perform service disruption.
The vulnerability exists due to improper input validation within the XML Database in Oracle Database Server. A remote authenticated user can exploit this vulnerability to perform service disruption.
3) Improper input validation (CVE-ID: CVE-2024-21233)
The vulnerability allows a remote authenticated user to manipulate data.
The vulnerability exists due to improper input validation within the Oracle Database Core in Oracle Database Server. A remote authenticated user can exploit this vulnerability to manipulate data.
4) Information disclosure (CVE-ID: CVE-2024-29025)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in HttpPostRequestDecoder. A remote attacker can gain unauthorized access to sensitive information on the system.
5) Out-of-bounds read (CVE-ID: CVE-2024-7264)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the ASN1 parser code in the GTime2str() function. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the system.
6) Type Confusion (CVE-ID: CVE-2024-6119)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a type confusion error when performing certificate name checks. A remote attacker can supply a specially crafted X.509 certificate to the server, trigger a type confusion error and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.