First published: Tue Oct 14 2008(Updated: )
Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the Oracle October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue involves an authentication bypass by establishing a TNS connection and impersonating a user session via a crafted authentication message during proxy authentication mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle 9i | =9.2.0.8dv | |
Oracle 9i | =9.2.0.8 | |
Oracle Database | =10.1.0.5 | |
Oracle Database | =10.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2625 has a high severity risk as it allows remote attackers to compromise confidentiality and integrity.
To fix CVE-2008-2625, it is recommended to apply the latest patches provided by Oracle for the affected database versions.
CVE-2008-2625 affects Oracle Database versions 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.2.
Yes, CVE-2008-2625 can be exploited remotely by attackers.
CVE-2008-2625 impacts the Core RDBMS component of Oracle Database.