First published: Tue Jul 20 2021(Updated: )
Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Procedure, Alter Any Table privilege with network access via Oracle Net to compromise Oracle Text. Successful attacks of this vulnerability can result in takeover of Oracle Text. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Text | =12.1.0.2 | |
Oracle Text | =12.2.0.1 | |
Oracle Text | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-2328 is high with a severity value of 7.2.
The versions 12.1.0.2, 12.2.0.1, and 19c of Oracle Database Server are affected by CVE-2021-2328.
An attacker needs the Create Any Procedure and Alter Any Table privilege to exploit CVE-2021-2328.
The vulnerability CVE-2021-2328 can be exploited by a high privileged attacker with network access via Oracle Net to perform unauthorized actions.
Yes, Oracle has released a security patch to address the vulnerability CVE-2021-2328. It is recommended to apply the patch as soon as possible.