First published: Thu Oct 19 2017(Updated: )
Vulnerability in the Oracle Communications WebRTC Session Controller component of Oracle Communications Applications (subcomponent: Security (Gson)). Supported versions that are affected are 7.0, 7.1 and 7.2. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle Communications WebRTC Session Controller. While the vulnerability is in Oracle Communications WebRTC Session Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications WebRTC Session Controller. CVSS 3.0 Base Score 6.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebRTC Session Controller | =7.0 | |
Oracle WebRTC Session Controller | =7.1 | |
Oracle WebRTC Session Controller | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10153 is classified as a low severity vulnerability due to its difficult exploitation nature.
To fix CVE-2017-10153, upgrade the Oracle WebRTC Session Controller to versions 7.3 or later.
CVE-2017-10153 affects Oracle WebRTC Session Controller versions 7.0, 7.1, and 7.2.
CVE-2017-10153 can potentially be exploited by a low privileged attacker with network access.
CVE-2017-10153 involves the Security subcomponent of the Oracle Communications WebRTC Session Controller.