First published: Wed Oct 17 2018(Updated: )
Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Text. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Text, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Text as well as unauthorized update, insert or delete access to some of Oracle Text accessible data. CVSS 3.0 Base Score 8.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Text | =11.2.0.4 | |
Oracle Text | =12.1.0.2 | |
Oracle Text | =12.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-3299 vulnerability is high with a severity value of 8.2.
The versions 11.2.0.4, 12.1.0.2, and 12.2.0.1 of Oracle Database Server are affected by CVE-2018-3299 vulnerability.
The vulnerability in Oracle Text component allows an unauthenticated attacker with network access to compromise Oracle Text.
An attacker can exploit CVE-2018-3299 vulnerability by using multiple protocols to compromise Oracle Text.
You can find more information about CVE-2018-3299 vulnerability in the Oracle security advisory, BID, and SecurityTracker references provided.