navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: CVE-2012-3152 and CVE-2012-3153

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
danalane CVE-2012-3152 and CVE-2012-3153
Member 18th Oct, 2012 19:24
Ranking: 0
Posts: 1
User Since: 18th Oct, 2012
System Score: N/A
Location: US
I noticed on your advisory that these are rated as less critical. I am sure it is because you don't have all of the details about these vulnerabilities.

http://secunia.com/advisories/50987/

I discovered and reported two vulnerabilities back in March which got ahem.. "fixed" this CPU. There aren't enough details in Oracle's reports that lets me know which is which.

One of the vulnerabilities allows you to grab any file from the server that the Oracle account has access to. The other allows dumping of database usernames/passwords and databases. All with a web browser and no authentication needed.

You can also use one of the vulnerabilities to proxy other trusted Oracle servers on the network. You are also able to load other sites that may be behind a firewall using various protocols such as http/https/ftp, etc.

Dana Lane Taylor

Anthony Wells RE: CVE-2012-3152 and CVE-2012-3153
Expert Contributor 19th Oct, 2012 03:27
Score: 2463
Posts: 3,348
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

Hi ,

If you follow your own link to the Advisory SA50987 and scroll down , you will see a box where you can (re)post ; this is more likely to get the appropiate attention of Secunia staff .

It will automatically open a thread in this "Vulnerabilities Forum" .

However , you may need to follow these instructions to be sure of a response :-

http://secunia.com/community/advisories/report_vul...

Take care

Anthony


--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+