Summary
Detail | |||
---|---|---|---|
Vendor | Oracle | First view | 2017-06-27 |
Product | Communications Diameter Signaling Router | Last view | 2021-12-28 |
Version | 8.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:oracle:communications_diameter_signaling_router |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.6 | 2021-12-28 | CVE-2021-44832 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. |
5.9 | 2021-12-18 | CVE-2021-45105 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1. |
7 | 2021-10-25 | CVE-2021-21703 | In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user. |
7.5 | 2021-10-19 | CVE-2021-37137 | The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. |
7.5 | 2021-10-19 | CVE-2021-37136 | The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack |
7.5 | 2021-10-14 | CVE-2021-42340 | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. |
5.3 | 2021-07-15 | CVE-2021-34429 | For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5. |
5.3 | 2021-07-12 | CVE-2021-33037 | Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. |
6.5 | 2021-07-12 | CVE-2021-30640 | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. |
9.8 | 2021-03-25 | CVE-2021-21783 | A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability. |
7.5 | 2021-02-15 | CVE-2021-21702 | In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash. |
8.1 | 2021-01-06 | CVE-2020-36189 | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource. |
8.1 | 2020-12-17 | CVE-2020-35490 | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource. |
5.8 | 2020-10-21 | CVE-2020-14788 | Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). |
4.9 | 2020-10-21 | CVE-2020-14787 | Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). |
6.5 | 2020-10-02 | CVE-2020-7069 | In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data. |
8.1 | 2020-09-17 | CVE-2020-24750 | FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. |
5.9 | 2020-09-10 | CVE-2020-13920 | Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. |
9.8 | 2020-09-10 | CVE-2020-11998 | A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13 |
8.1 | 2020-08-25 | CVE-2020-24616 | FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP). |
6.5 | 2020-08-21 | CVE-2020-8622 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit. |
7.5 | 2020-07-08 | CVE-2020-11994 | Server-Side Template Injection and arbitrary file disclosure on Camel templating components |
8.1 | 2020-06-16 | CVE-2020-14195 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). |
8.1 | 2020-06-14 | CVE-2020-14062 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). |
8.1 | 2020-06-14 | CVE-2020-14061 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
38% (23) | CWE-502 | Deserialization of Untrusted Data |
5% (3) | CWE-203 | Information Exposure Through Discrepancy |
5% (3) | CWE-190 | Integer Overflow or Wraparound |
5% (3) | CWE-125 | Out-of-bounds Read |
3% (2) | CWE-787 | Out-of-bounds Write |
3% (2) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
3% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
3% (2) | CWE-20 | Improper Input Validation |
1% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
1% (1) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (1) | CWE-674 | Uncontrolled Recursion |
1% (1) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (1) | CWE-617 | Reachable Assertion |
1% (1) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (1) | CWE-522 | Insufficiently Protected Credentials |
1% (1) | CWE-494 | Download of Code Without Integrity Check |
1% (1) | CWE-476 | NULL Pointer Dereference |
1% (1) | CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsa... |
1% (1) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
1% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (1) | CWE-326 | Inadequate Encryption Strength |
1% (1) | CWE-306 | Missing Authentication for Critical Function |
1% (1) | CWE-284 | Access Control (Authorization) Issues |
1% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
SAINT Exploits
Description | Link |
---|---|
Oracle WebLogic Server BadAttributeValueExpException deserialization | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-31 | Oracle ADF Faces potential ViewState deserialization remote code execution at... RuleID : 56499 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-31 | Oracle ADF Faces potential ViewState deserialization remote code execution at... RuleID : 56498 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-31 | Multiple Products Java Faces ViewState deserialization remote code execution ... RuleID : 56497 - Type : SERVER-WEBAPP - Revision : 1 |
2020-07-30 | PHP php_strip_tags_ex function out-of-bounds read attempt RuleID : 54406 - Type : SERVER-WEBAPP - Revision : 1 |
2020-07-30 | PHP php_strip_tags_ex function out-of-bounds read attempt RuleID : 54405 - Type : SERVER-WEBAPP - Revision : 1 |
2020-07-07 | Apache Tomcat FileStore directory traversal attempt RuleID : 54162 - Type : SERVER-WEBAPP - Revision : 1 |
2020-05-27 | Oracle Coherence library LimitFilter insecure deserialization attempt RuleID : 53744 - Type : SERVER-ORACLE - Revision : 1 |
2019-08-06 | Oracle WebLogic Server blacklisted class use attempt RuleID : 50660 - Type : POLICY-OTHER - Revision : 3 |
2019-08-06 | Oracle WebLogic Server blacklisted class use attempt RuleID : 50659 - Type : POLICY-OTHER - Revision : 3 |
2019-07-23 | Oracle WebLogic Server remote command execution attempt RuleID : 50474 - Type : SERVER-ORACLE - Revision : 2 |
2019-07-23 | Oracle WebLogic Server remote command execution attempt RuleID : 50473 - Type : SERVER-ORACLE - Revision : 2 |
2018-03-29 | PHPUnit PHP remote code execution attempt RuleID : 45749 - Type : SERVER-WEBAPP - Revision : 2 |
2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45444 - Type : OS-OTHER - Revision : 2 |
2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45443 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45368 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45367 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45366 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45365 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45364 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45363 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45362 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45361 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45360 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45359 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45358 - Type : OS-OTHER - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-168af81706.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-e6894349c9.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL91229003.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-06.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1233.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1236.nasl - Type: ACT_GATHER_INFO |
2018-09-17 | Name: The remote Debian host is missing a security update. File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO |
2018-09-07 | Name: The remote Debian host is missing a security update. File: debian_DLA-1497.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0098.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0011.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1422.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_fe93803c883f11e89f0c001b216d295b.nasl - Type: ACT_GATHER_INFO |
2018-07-09 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9f02e5ed7b.nasl - Type: ACT_GATHER_INFO |
2018-06-11 | Name: The remote Fedora host is missing a security update. File: fedora_2018-79792e0c64.nasl - Type: ACT_GATHER_INFO |
2018-06-05 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4215.nasl - Type: ACT_GATHER_INFO |
2018-05-30 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4213.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote Debian host is missing a security update. File: debian_DLA-1385.nasl - Type: ACT_GATHER_INFO |
2018-05-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1369.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4187.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4188.nasl - Type: ACT_GATHER_INFO |
2018-04-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-1362.nasl - Type: ACT_GATHER_INFO |
2018-04-25 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4179.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-939.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-942.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-952.nasl - Type: ACT_GATHER_INFO |