2006-3703 | Oracle Database Server Remote Privilege Escalation (BID-19054 / XFDB-27897)
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.3 | $5k-$25k | 0.85 |
A vulnerability was found in Oracle Database Server 9.0.1.5 (Database Software) and classified as very critical. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Unspecified vulnerability in InterMedia for Oracle Database 9.0.1.5, 9.2.0.6, and 10.1.0.4 has unknown impact and attack vectors, aka oracle Vuln# DB07.
The weakness was released 07/21/2006 by Esteban Martinez Fayo (Alex) with Next Generation Security Software (Website). The advisory is available at us-cert.gov. This vulnerability is handled as CVE-2006-3703 since 07/18/2006. The exploitation is known to be easy. The attack may be launched remotely. A simple authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 07/12/2021).
It is declared as proof-of-concept. As 0-day the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 56053 (Oracle Database Multiple Vulnerabilities (July 2006 CPU)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Databases.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 4558.
The vulnerability is also documented in the databases at SecurityFocus (BID 19054), X-Force (27897), Secunia (SA21111), SecurityTracker (ID 1016529) and Vulnerability Center (SBV-12346). Entries connected to this vulnerability are available at 31427, 31426, 31425 and 31424.
Type
Vendor
Name
VulDB Meta Base Score: 8.8
VulDB Meta Temp Score: 8.3
VulDB Base Score: 8.8
VulDB Temp Score: 8.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Class: Unknown
CWE: Unknown
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 56053
Nessus Name: Oracle Database Multiple Vulnerabilities (July 2006 CPU)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: no mitigation known
Status: 🔍
0-Day Time: 🔍
TippingPoint: 🔍
SourceFire IPS: 🔍
07/18/2006 🔍
07/18/2006 🔍
07/18/2006 🔍
07/18/2006 🔍
07/19/2006 🔍
07/21/2006 🔍
07/21/2006 🔍
07/25/2006 🔍
04/10/2014 🔍
03/12/2015 🔍
07/12/2021 🔍Vendor: https://www.oracle.com
Advisory: us-cert.gov
Researcher: Esteban Martinez Fayo (Alex)
Organization: Next Generation Security Software
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-3703 (🔍)
SecurityFocus: 19054 – Oracle July 2006 Security Update Multiple Vulnerabilities
Secunia: 21111 – Oracle Products Multiple Vulnerabilities, Highly Critical
X-Force: 27897
SecurityTracker: 1016529 – Oracle Database and Other Products Have Multiple Unspecified Vulnerabilities With Unspecified Impact
Vulnerability Center: 12346 – Oracle Database Unspecified Vulnerability in InterMedia, High
Vupen: ADV-2006-2863
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Created: 03/12/2015 14:25
Updated: 07/12/2021 18:28
Changes: (2) source_nessus_risk vulnerability_cvss2_nvd_basescore
Complete: 🔍
Check our Alexa App!