First published: Wed Jan 15 2020(Updated: )
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via OracleNet to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Core RDBMS. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database Server | =12.1.0.2 | |
Oracle Database Server | =12.2.0.1 | |
Oracle Database Server | =18c | |
Oracle Database Server | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-2511 is high, with a CVSS score of 7.7.
Versions 12.1.0.2, 12.2.0.1, 18c, and 19c of Oracle Database Server are affected by CVE-2020-2511.
A low privileged attacker with Create Session privilege and network access via OracleNet can exploit CVE-2020-2511.
Apply the necessary security patches provided by Oracle to fix CVE-2020-2511.
You can find more information about CVE-2020-2511 on the Oracle Security Alerts page: https://www.oracle.com/security-alerts/cpujan2020.html