Format string vulnerability in the logging function in the Oracle OPMN daemon, as used on Oracle Enterprise Grid Console server 10.2.0.1, allows remote attackers to execute arbitrary code via format string specifiers in the URI in an HTTP request to port 6003, aka Oracle reference number 6296175. NOTE: this might be the same issue as CVE-2007-0282 or CVE-2007-0280, but there are insufficient details to be sure.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.irmplc.com/index.php/111-Vendor-Alerts - | |
References | () http://www.irmplc.com/index.php/142-Advisory-021 - Exploit, Patch, Vendor Advisory | |
References | () http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html - |
Information
Published : 2007-10-18 20:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-5561
Mitre link : CVE-2007-5561
CVE.ORG link : CVE-2007-5561
JSON object : View
Products Affected
oracle
- enterprise_grid_console_server
- opmn_daemon
CWE
CWE-134
Use of Externally-Controlled Format String