First published: Fri Aug 31 2007(Updated: )
Multiple stack-based buffer overflows in the Oracle JInitiator ActiveX control (beans.ocx) 1.1.8.16 and earlier, as used by Oracle Forms applications from Oracle and third parties, allow remote attackers to execute arbitrary code via unspecified "initialization parameters." NOTE: it was later reported that 1.1.8.3 through 1.1.8.25, and probably 1.1.5.x and 1.1.7.x, are affected.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JInitiator | =1.1.8.16 | |
Oracle JInitiator | =1.1.5 | |
Oracle JInitiator | =1.1.8.3 | |
Oracle JInitiator | =1.1.8.25 | |
Oracle JInitiator | =1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4467 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2007-4467, users should upgrade to a patched version of Oracle JInitiator.
CVE-2007-4467 affects Oracle JInitiator versions 1.1.5, 1.1.7, 1.1.8.3, 1.1.8.16, and 1.1.8.25.
Yes, CVE-2007-4467 can be exploited remotely by attackers to execute arbitrary code on vulnerable systems.
If unable to upgrade, consider implementing additional security controls to restrict access to the affected application.