The remote Oracle Database, according to its version number, is vulnerable to several flaws, ranging from information disclosure about the remote host to code execution.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(16209);
script_version("1.32");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");
script_cve_id(
"CVE-2004-0637",
"CVE-2004-0638",
"CVE-2004-1362",
"CVE-2004-1363",
"CVE-2004-1364",
"CVE-2004-1365",
"CVE-2004-1366",
"CVE-2004-1367",
"CVE-2004-1368",
"CVE-2004-1369",
"CVE-2004-1370",
"CVE-2004-1371"
);
script_bugtraq_id(
10871,
11091,
11099,
11100,
11120,
12296,
12301
);
script_name(english:"Oracle Database Multiple Vulnerabilities (January 2005 CPU)");
script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote Oracle Database, according to its version number,
is vulnerable to several flaws, ranging from information
disclosure about the remote host to code execution.");
# https://www.oracle.com/technetwork/topics/security/cpu-jan-2005-advisory-129526.pdf
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?976ed6e6");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the January 2005 Oracle
Critical Patch Update advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploit_framework_exploithub", value:"true");
script_set_attribute(attribute:"exploithub_sku", value:"EH-10-031");
script_cwe_id(22, 94, 119, 200, 255);
script_set_attribute(attribute:"patch_publication_date", value:"2005/01/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2005/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:database_server");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is (C) 2005-2022 Tenable Network Security, Inc.");
script_dependencies("oracle_tnslsnr_version.nasl");
script_require_ports("Services/oracle_tnslsnr");
exit(0);
}
include('global_settings.inc');
if ( report_paranoia < 1 ) exit(0);
port = get_kb_item("Services/oracle_tnslsnr");
if ( isnull(port)) exit(0);
version = get_kb_item(string("oracle_tnslsnr/",port,"/version"));
if (version)
{
iversion = split(version, sep:'.', keep:FALSE);
if ( int(iversion[0]) == 8 )
{
if (int(iversion[1]) == 0 ) # 8.0.6.3
{
if ( int(iversion[2]) < 6 || ( int(iversion[2]) == 6 && int(iversion[3]) <= 3) )
security_hole ( 0 );
}
else if ( int(iversion[1]) == 1 ) # 8.1.7.4
{
if ( int(iversion[2]) < 7 || ( int(iversion[2]) == 7 && int(iversion[3]) <= 4 ) )
security_hole ( 0 );
}
}
else if ( int(iversion[0]) == 9 )
{
if ( int(iversion[1]) == 0 ) # 9.0.1.5
{
if ( int(iversion[2]) < 1 || ( int(iversion[1]) == 1 && int(iversion[2]) <=5 ) )
security_hole ( 0 );
}
else if (int(iversion[1]) == 2 ) # 9.2.0.6
{
if ( int(iversion[2]) == 0 && int(iversion[3]) <= 6 )
security_hole ( 0 );
}
}
else if ( int(iversion[0]) == 10 )
{
# 10.1.0.3.1
if ( int(iversion[1]) == 1 )
{
if ( int(iversion[2]) == 0 && int(iversion[3]) < 3 )
security_hole( 0 );
if ( !isnull(iversion[4]) )
{
if ( int(iversion[2]) == 0 && int(iversion[3]) == 3 && int(iversion[4]) <= 1 )
security_hole( 0 );
}
else if ( int(iversion[2]) == 0 && int(iversion[3]) == 3 )
security_hole ( 0 );
}
}
}
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | database_server | cpe:/a:oracle:database_server |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0637
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0638
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1362
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1363
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1364
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1365
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1366
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1367
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1368
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1369
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1370
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1371
www.nessus.org/u?976ed6e6