First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3233 is classified as a high-severity vulnerability that can be easily exploited.
To fix CVE-2017-3233, upgrade to Oracle Automatic Service Request version 5.7 or later.
CVE-2017-3233 affects users of Oracle Automatic Service Request versions prior to 5.7.
CVE-2017-3233 can be exploited by an unauthenticated attacker with network access via HTTP.
CVE-2017-3233 affects the Automatic Service Request (ASR) component of Oracle Support Tools.