First published: Tue Jul 23 2019(Updated: )
Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and 12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Berkeley DB | =12.1.6.1.23 | |
Oracle Berkeley DB | =12.1.6.1.26 | |
Oracle Berkeley DB | =12.1.6.1.29 | |
Oracle Berkeley DB | =12.1.6.1.36 | |
Oracle Berkeley DB | =12.1.6.2.23 | |
Oracle Berkeley DB | =12.1.6.2.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2871 is high.
The affected versions of Oracle Berkeley DB are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and 12.1.6.2.32.
An unauthenticated attacker with logon to the infrastructure can exploit CVE-2019-2871.
Oracle has released patches to address the vulnerability in the affected versions of Oracle Berkeley DB. Apply the necessary patches recommended by Oracle.
You can find more information about CVE-2019-2871 on the Oracle Security Advisory page at http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html.