First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Berkeley DB | <6.2.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-3612 is rated as high with a score of 7.
To fix CVE-2017-3612, upgrade Oracle Berkeley DB to version 6.2.32 or later.
The main impact of CVE-2017-3612 is the potential for unauthenticated attackers to compromise the Data Store.
Versions of Oracle Berkeley DB prior to 6.2.32 are affected by CVE-2017-3612.
CVE-2017-3612 can be exploited by unauthenticated attackers who have logon access to the infrastructure where Data Store executes.