First published: Wed Oct 16 2019(Updated: )
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS. CVSS 3.0 Base Score 3.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database Server | =11.2.0.4 | |
Oracle Database Server | =12.1.0.2 | |
Oracle Database Server | =12.2.0.1 | |
Oracle Database Server | =18c | |
Oracle Database Server | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-2954 is low, with a score of 3.9.
The affected versions of Oracle Database Server are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, and 19c.
A low privileged attacker needs Create Session and Create Procedure privileges with logon to the infrastructure to exploit CVE-2019-2954.
To fix CVE-2019-2954, apply the necessary patches provided by Oracle and follow their recommended security advisories.
More information about CVE-2019-2954 can be found on Oracle's website at the following URL: http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html