Oracle warns of CVE-18-3110 Critical Vulnerability in Oracle Database product, patch it now!
13.8.18 securityaffairs Vulnerebility
Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-18-3110 has received a CVSS score of 9.9,
On Friday, Oracle released security patches to address a critical vulnerability affecting its Database product, the company is urging install them as soon as possible.
The vulnerability resides in the Java VM component of Oracle Database Server, a remote authenticated attacker can exploit it take complete control of the product and establish a shell access to the underlying server.
The vulnerability, tracked as CVE-18-3110, affects Oracle Database 126.96.36.199, 188.8.131.52, 184.108.40.206 on Windows and 220.127.116.11 running on Unix or Linux.
“Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 18.104.22.168, 22.214.171.124, 126.96.36.199 and 18.” reads the security advisory published by Oracle “Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Java VM. While the vulnerability is in Java VM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java VM. “
The Version 188.8.131.52 on both Windows and Unix/Linux systems was already addressed with the Oracle July 18 CPU.
“Due to the nature of this vulnerability, Oracle recommends that customers apply these patches as soon as possible.” reads the blog post published by Oracle.
“This means that:
Customers running Oracle Database versions 184.108.40.206 and 220.127.116.11 on Windows should apply the patches provided by the Security Alert.
Customers running version 18.104.22.168 on Windows or any version of the database on Linux or Unix should apply the July 18 Critical Patch Update if they have not already done so.”
Oracle “strongly recommends that customers take action without delay.”