First published: Fri Jan 27 2017(Updated: )
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Patching). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Application Object Library executes to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Application Object Library accessible data as well as unauthorized access to critical data or complete access to all Oracle Application Object Library accessible data. CVSS v3.0 Base Score 6.0 (Confidentiality and Integrity impacts).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Object Library | =12.1.3 | |
Oracle Application Object Library | =12.2.3 | |
Oracle Application Object Library | =12.2.4 | |
Oracle Application Object Library | =12.2.5 | |
Oracle Application Object Library | =12.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3246 is considered easily exploitable and poses a high risk if an attacker gains access.
To fix CVE-2017-3246, apply the latest security patches provided by Oracle for the affected versions.
CVE-2017-3246 affects Oracle Application Object Library versions 12.1.3, 12.2.3, 12.2.4, 12.2.5, and 12.2.6.
No, CVE-2017-3246 requires high privileged access, which means an attacker needs to log on to the infrastructure.
CVE-2017-3246 specifically impacts the Patching component of the Oracle Application Object Library.