4.4 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.157 Low
EPSS
Percentile
96.0%
Oracle Outside In contains an exploitable vulnerability in the Lotus 123 version 4 file parser, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Oracle Outside In is a set of libraries that can decode over 500 different file formats. Originally written by Stellent, Outside In is now part of Oracle. The Oracle Outside In libraries are used by a variety of applications, including Oracle Fusion Middleware, Google Search Appliance, Guidance Encase Forensics, AccessData FTK, and Novell Groupwise.
Outside In fails to properly handle Lotus 123 version 4 file data, which is handled on the Windows platform by the vswk4.dll
library. The Linux version of Outside In uses libvs_wk4.so
. Other supported platforms may use different file names.
Limited testing has shown that the Lotus 123 version 4 parser in Outside in versions prior to 8.3.5.6195 and 8.3.7.77 are vulnerable.
By causing an application to process a specially-crafted file with the Oracle Outside In library, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the vulnerable application. Depending on what application is using Outside In, this may happen as the result of some user interaction, such as single-clicking on a file, or it may happen with no user interaction at all.
Apply an update
These vulnerabilites are addressed in the Oracle Fusion Middleware Critical Patch Update January 2012. This update provides the Outside In Lotus 123 version 4 parser versions 8.3.5.6195, and 8.3.7.77, which address this vulnerability. Please consider the following workarounds.
Use the Microsoft Enhanced Mitigation Experience Toolkit
The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this and other vulnerabilities.
Enable DEP in Microsoft Windows
Consider enabling Data Execution Prevention (DEP) in supported versions of Windows. DEP should not be treated as a complete workaround, but it can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts “Understanding DEP as a mitigation technology” part 1 and part 2. DEP should be used in conjunction with the application of patches or other mitigations described in this document.
Note that when relying on DEP for exploit mitigation, it is important to use a system that supports Address Space Layout Randomization (ASLR) as well. ASLR is not supported by Windows XP or Windows Server 2003 or earlier. ASLR was introduced with Microsoft Windows Vista and Windows Server 2008. Please see the Microsoft SRD blog entry: On the effectiveness of DEP and ASLR for more details.
738961
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 06, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown ACD Systems Canvas 14 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: March 02, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown FTK 3.2, 3.3, and 3.4 to be vulnerable. FTK 4.0.0 contains Outside In version 8.3.5.6195, which contains a fix for this vulnerability.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown Quick View Plus 11 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Cisco Security Agent uses Oracle Outside In to provide Data Loss Prevention (DLP) functionality.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: April 01, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Google Search Appliance (GSA) uses Outside In. Google has indicated that they update Outside In when appropriate, but they have not indicated which GSA version may address this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: May 10, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Guidance Encase Forensics 7.04 includes the fixed version of Outside In. Limited testing has shown Guidance Encase Forensics 6.19.3 and 7.03.02 to be vulnerable. Other Encase products and versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
HP TRIM uses the Oracle Outside In libraries
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 29, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Many IBM ECM products use Oracle Outside In.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown Kamel Fastlook 2009 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Some Kroll Ontrack software, such as Ontrack EasyRecovery and PowerControls, uses Outside In to provide file viewing capabilities.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown Lucion FileCenter 7.1.0.35 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 31, 2012
Affected
We have not received a statement from the vendor.
The vulnerability no longer exists any any current version of MarkLogicServer, and users cannot download an affected version.
The updated versions of the server are available for download at
<http://developer.marklogic.com>.
Oracle Outside In is provided with MarkLogic Server 4.0, 4.1, and 4.2. MarkLogic Server 5.0 does not provide the Oracle Outside In libraries, however.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
McAfee GroupShield as well as Host Data Loss Prevention 9.0 and earlier use Outside In to provide file content filtering capabilities. Limited testing has shown GroupShield 7.0.716.101 to be vulnerable, resulting in code execution with SYSTEM privileges. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown Presto! PageManager 9 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Novell Groupwise uses Outside In for viewing email attachments and is affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: December 07, 2011 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown Paraben Device Seizure 4.3 to be vulnerable. Other versions may also be affected. Paraben has stopped using Outside In starting with version 4.5 build 4262.38310, and is therefore not affected with this and later versions.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Perlustro ILook uses the Oracle Outside In library.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: April 28, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Raytheon SureView uses Outside In.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 16, 2012 Updated: March 05, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Symantec Enterprise Vault uses Oracle Outside In. Hot fix TECH182366 has been released for Symantec Enterprise Vault 10.0.x and 9.0.x to address this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
windream server uses the Outside In libraries.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Limited testing has shown X1 Professional 6.7.2 to be vulnerable. Other versions may also be affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
kCura Relativity uses the Oracle Outside In library.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Some Dell printer software provides files from Outside In, but it is not clear if it is affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Good Technology Mobile Messaging Server uses Outside In.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Some Lexmark printer software provides components from Outside In, but it is not clear if it is affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 16, 2012 Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Sharp Sharpdesk provides some components from Outside In, but it is not clear if it is affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
Notified: January 16, 2012 Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: January 16, 2012
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
West Publisher E-Transcript Bundle Viewer provides some components from Outside In, but it is not clear if it is affected.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23738961 Feedback>).
View all 31 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 9 | AV:N/AC:M/Au:N/C:C/I:C/A:P |
Temporal | 7 | E:POC/RL:OF/RC:C |
Environmental | 7.1 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
CVE IDs: | CVE-2012-0110 |
---|---|
Severity Metric: | 26.24 Date Public: |