Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: CVE-2012-3152 and CVE-2012-3153

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
danalane CVE-2012-3152 and CVE-2012-3153
Member 18th Oct, 2012 19:24
Ranking: 0
Posts: 1
User Since: 18th Oct, 2012
System Score: N/A
Location: US
I noticed on your advisory that these are rated as less critical. I am sure it is because you don't have all of the details about these vulnerabilities.

http://secunia.com/advisories/50987/

I discovered and reported two vulnerabilities back in March which got ahem.. "fixed" this CPU. There aren't enough details in Oracle's reports that lets me know which is which.

One of the vulnerabilities allows you to grab any file from the server that the Oracle account has access to. The other allows dumping of database usernames/passwords and databases. All with a web browser and no authentication needed.

You can also use one of the vulnerabilities to proxy other trusted Oracle servers on the network. You are also able to load other sites that may be behind a firewall using various protocols such as http/https/ftp, etc.

Dana Lane Taylor

Anthony Wells RE: CVE-2012-3152 and CVE-2012-3153
Expert Contributor 19th Oct, 2012 03:27
Score: 2434
Posts: 3,317
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

Hi ,

If you follow your own link to the Advisory SA50987 and scroll down , you will see a box where you can (re)post ; this is more likely to get the appropiate attention of Secunia staff .

It will automatically open a thread in this "Vulnerabilities Forum" .

However , you may need to follow these instructions to be sure of a response :-

http://secunia.com/community/advisories/report_vul...

Take care

Anthony


--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability