First published: Wed Jan 15 2020(Updated: )
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS. CVSS 3.0 Base Score 3.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database Server | =12.1.0.2 | |
Oracle Database Server | =12.2.0.1 | |
Oracle Database Server | =18c | |
Oracle Database Server | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2731.
The affected versions are 12.1.0.2, 12.2.0.1, 18c, and 19c.
The severity of CVE-2020-2731 is low (3.9).
The vulnerability can be easily exploited by a low privileged attacker with Local Logon privilege.
Yes, Oracle has released a patch to fix CVE-2020-2731.