2006-3704 | Oracle Database Server ODBC Driver Remote Code Execution (BID-19054 / XFDB-27897)


CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
9.3 $5k-$25k 0.86

A vulnerability was found in Oracle Database Server 10.1.0.4 (Database Software). It has been classified as very critical. This affects an unknown code block of the component ODBC Driver. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:

Unspecified vulnerability in the Oracle ODBC Driver for Oracle Database 10.1.0.4 has unknown impact and attack vectors, aka Oracle Vuln# 10.1.0.4.

The weakness was disclosed 07/21/2006 by Esteban Martinez Fayo (Alex) with Next Generation Security Software (Website). It is possible to read the advisory at us-cert.gov. This vulnerability is uniquely identified as CVE-2006-3704 since 07/18/2006. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 07/12/2021).

It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 56053 (Oracle Database Multiple Vulnerabilities (July 2006 CPU)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Databases.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 4558.

The vulnerability is also documented in the databases at SecurityFocus (BID 19054), X-Force (27897), Secunia (SA21111), SecurityTracker (ID 1016529) and Vulnerability Center (SBV-12347). The entries 31427, 31426, 31425 and 31424 are pretty similar.

Type

Vendor

Name

VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.3

VulDB Base Score: 9.8
VulDB Temp Score: 9.3
VulDB Vector: 🔍
VulDB Reliability: 🔍

AV AC Au C I A
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍

NVD Base Score: 🔍

Class: Unknown
CWE: Unknown
ATT&CK: Unknown

Local: No
Remote: Yes

Availability: 🔍
Access: Public
Status: Proof-of-Concept

Price Prediction: 🔍
Current Price Estimation: 🔍


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock


Nessus ID: 56053
Nessus Name: Oracle Database Multiple Vulnerabilities (July 2006 CPU)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍

Threat Intelligenceinfoedit

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: no mitigation known
Status: 🔍

0-Day Time: 🔍
TippingPoint: 🔍
SourceFire IPS: 🔍

07/18/2006 🔍
07/18/2006 +0 days 🔍
07/18/2006 +0 days 🔍
07/18/2006 +0 days 🔍
07/19/2006 +1 days 🔍
07/21/2006 +2 days 🔍
07/21/2006 +0 days 🔍
07/25/2006 +4 days 🔍
09/22/2013 +2616 days 🔍
03/12/2015 +536 days 🔍
07/12/2021 +2314 days 🔍Vendor: https://www.oracle.com

Advisory: us-cert.gov
Researcher: Esteban Martinez Fayo (Alex)
Organization: Next Generation Security Software
Status: Confirmed
Confirmation: 🔍

CVE: CVE-2006-3704 (🔍)
SecurityFocus: 19054 – Oracle July 2006 Security Update Multiple Vulnerabilities
Secunia: 21111 – Oracle Products Multiple Vulnerabilities, Highly Critical
X-Force: 27897
SecurityTracker: 1016529 – Oracle Database and Other Products Have Multiple Unspecified Vulnerabilities With Unspecified Impact
Vulnerability Center: 12347 – Oracle Database Unspecified Vulnerability in ODBC Driver, Critical
Vupen: ADV-2006-2863

scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍

Created: 03/12/2015 14:25
Updated: 07/12/2021 18:35
Changes: (2) source_nessus_risk vulnerability_cvss2_nvd_basescore
Complete: 🔍

Use the official API to access entries easily!



Source link