Advisory Published
Updated

CVE-2013-0374

First published: Thu Jan 17 2013(Updated: )

Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.1, and 12.1.0.2 allows remote attackers to affect integrity via unknown vectors related to Database Cloning.

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle Enterprise Manager Grid Control 10g=10.2.0.5
Oracle Enterprise Manager Grid Control 10g=11.1.0.1
Oracle Enterprise Manager for Oracle Database=10.2.0.3
Oracle Enterprise Manager for Oracle Database=10.2.0.4
Oracle Enterprise Manager for Oracle Database=10.2.0.5
Oracle Enterprise Manager for Oracle Database=11.1.0.7
Oracle Enterprise Manager for Oracle Database=11.2.0.2
Oracle Enterprise Manager for Oracle Database=11.2.0.3
Oracle Enterprise Manager Plugin for Database Control=12.1.0.1
Oracle Enterprise Manager Plugin for Database Control=12.1.0.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-0374?

    CVE-2013-0374 is considered to have a high severity due to the potential for remote attacks.

  • How can I mitigate the risks associated with CVE-2013-0374?

    To mitigate CVE-2013-0374, it is essential to apply the latest security patches provided by Oracle for affected versions.

  • Which Oracle products are affected by CVE-2013-0374?

    CVE-2013-0374 affects various versions of Oracle Enterprise Manager Grid Control and Oracle Enterprise Manager Database Control.

  • What type of attacks does CVE-2013-0374 allow?

    CVE-2013-0374 allows remote attackers to exploit unspecified vulnerabilities in Oracle Enterprise Manager components.

  • Is there a workaround for CVE-2013-0374 if I cannot apply a patch immediately?

    While the best solution is to apply patches, limiting access to vulnerable components and enhancing network security can serve as temporary workarounds.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203