跳转到帖子

Oracle Database: Critical Patch Update - October 2023 (CVE-2023-22071)

recommended_posts

发布于
  • Members

Oracle Database: Critical Patch Update - October 2023 (CVE-2023-22071)

Severity
5
CVSS
(AV:N/AC:M/Au:M/C:P/I:P/A:P)
Published
10/17/2023
Created
10/20/2023
Added
10/18/2023
Modified
01/28/2025

Description

Vulnerability in the PL/SQL component of Oracle Database Server.Supported versions that are affected are 19.3-19.20 and21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Execute on sys.utl_http privilege with network access via Oracle Net to compromise PL/SQL.Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PL/SQL, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result inunauthorized update, insert or delete access to some of PL/SQL accessible data as well asunauthorized read access to a subset of PL/SQL accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PL/SQL. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts).CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L).

Solution(s)

  • oracle-apply-oct-2023-cpu

References

  • https://attackerkb.com/topics/cve-2023-22071
  • CVE - 2023-22071
  • http://www.oracle.com/security-alerts/cpuoct2023.html
  • https://support.oracle.com/rs?type=doc&id=2966413.1
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…