| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Oracle Secure Backup. This impacts an unknown function of the component mod_ssl. Such manipulation leads to an unknown weakness. This vulnerability is traded as CVE-2010-3596. There is no exploit available. It is advisable to implement a patch to correct this issue.
Details
A vulnerability was found in Oracle Secure Backup (Backup Software) (affected version not known) and classified as problematic. Affected by this issue is some unknown functionality of the component mod_ssl. Impacted is integrity, and availability. CVE summarizes:
Unspecified vulnerability in the mod_ssl component in Oracle Secure Backup 10.3.0.2 allows remote attackers to affect integrity and availability via unknown vectors.
The weakness was shared 01/19/2011 by Maksymilian Arciemowicz (BSDaemon) with Oracle (Website). The advisory is shared for download at oracle.com. This vulnerability is handled as CVE-2010-3596 since 09/20/2010. The attack needs to be approached locally. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
It is declared as proof-of-concept.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at oracle.com.
The vulnerability is also documented in the databases at SecurityFocus (BID 45850†), Secunia (SA42918†), SecurityTracker (ID 1024974†) and Vulnerability Center (SBV-29228†). The entries VDB-4241, VDB-4242, VDB-4245 and VDB-4246 are related to this item. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.oracle.com
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.1VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.1
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: UnknownCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: oracle.com
Timeline
09/20/2010 🔍01/18/2011 🔍
01/18/2011 🔍
01/18/2011 🔍
01/19/2011 🔍
01/19/2011 🔍
01/19/2011 🔍
02/14/2011 🔍
03/13/2017 🔍
Sources
Vendor: oracle.comAdvisory: oracle.com
Researcher: Maksymilian Arciemowicz (BSDaemon)
Organization: Oracle
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2010-3596 (🔍)
GCVE (CVE): GCVE-0-2010-3596
GCVE (VulDB): GCVE-100-4244
SecurityFocus: 45850 - Oracle Secure Backup CVE-2010-3596 Remote mod_ssl Vulnerability
Secunia: 42918 - Oracle Secure Backup mod_ssl Unauthorised Data Manipulation Vulnerability, Moderately Critical
SecurityTracker: 1024974 - Oracle Secure Backup mod_ssl Flaw Lets Remote Users Partially Modify Data and Cause Partial Denial of Service Conditions
Vulnerability Center: 29228 - Oracle Secure Backup 10.3.0.2 mod_ssl Component Remote Unspecified Vulnerability, Medium
Vupen: ADV-2011-0142
See also: 🔍
Entry
Created: 02/14/2011 10:33Updated: 03/13/2017 12:26
Changes: 02/14/2011 10:33 (69), 03/13/2017 12:26 (10)
Complete: 🔍
Cache ID: 216:471:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.