CVE-2007-5561

Format string vulnerability in the logging function in the Oracle OPMN daemon, as used on Oracle Enterprise Grid Console server 10.2.0.1, allows remote attackers to execute arbitrary code via format string specifiers in the URI in an HTTP request to port 6003, aka Oracle reference number 6296175. NOTE: this might be the same issue as CVE-2007-0282 or CVE-2007-0280, but there are insufficient details to be sure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:enterprise_grid_console_server:10.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:opmn_daemon:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:38

Type Values Removed Values Added
References () http://www.irmplc.com/index.php/111-Vendor-Alerts - () http://www.irmplc.com/index.php/111-Vendor-Alerts -
References () http://www.irmplc.com/index.php/142-Advisory-021 - Exploit, Patch, Vendor Advisory () http://www.irmplc.com/index.php/142-Advisory-021 - Exploit, Patch, Vendor Advisory
References () http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html - () http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html -

Information

Published : 2007-10-18 20:17

Updated : 2025-04-09 00:30


NVD link : CVE-2007-5561

Mitre link : CVE-2007-5561

CVE.ORG link : CVE-2007-5561


JSON object : View

Products Affected

oracle

  • enterprise_grid_console_server
  • opmn_daemon
CWE
CWE-134

Use of Externally-Controlled Format String