Oracle Communications Session Border Controller SCX640m5 Lawful Intercept path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Oracle Communications Session Border Controller SCX640m5. The affected element is an unknown function of the component Lawful Intercept. This manipulation causes path traversal. The identification of this vulnerability is CVE-2014-6465. There is no exploit available. You should upgrade the affected component.
Details
A vulnerability has been found in Oracle Communications Session Border Controller SCX640m5 (Cloud Software) and classified as critical. Affected by this vulnerability is some unknown functionality of the component Lawful Intercept. The manipulation with an unknown input leads to a path traversal vulnerability. The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. As an impact it is known to affect availability. The summary by CVE is:
Unspecified vulnerability in the Oracle Communications Session Border Controller component in Oracle Communications Applications SCX640m5 allows remote authenticated users to affect availability via unknown vectors related to Lawful Intercept.
The weakness was shared 10/15/2014 with Oracle as Oracle Critical Patch Update Advisory - October 2014 as confirmed advisory (Website). The advisory is shared at oracle.com. This vulnerability is known as CVE-2014-6465 since 09/17/2014. The attack can be launched remotely. A single authentication is required for exploitation. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1006 for this issue.
Upgrading eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (97126), SecurityFocus (BID 70573†) and Vulnerability Center (SBV-46492†). Additional details are provided at krebsonsecurity.com. The entries VDB-67525, VDB-67832, VDB-67831 and VDB-67806 are related to this item. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.oracle.com
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.5
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Timeline
09/17/2014 🔍10/14/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
10/15/2014 🔍
06/08/2017 🔍
Sources
Vendor: oracle.comAdvisory: Oracle Critical Patch Update Advisory - October 2014
Organization: Oracle
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-6465 (🔍)
GCVE (CVE): GCVE-0-2014-6465
GCVE (VulDB): GCVE-100-67909
X-Force: 97126 - Oracle Communications Session Border Controller Lawful Intercept denial of service, Medium Risk
SecurityFocus: 70573 - Oracle Communications Applications CVE-2014-6465 Remote Security Vulnerability
Vulnerability Center: 46492 - [cpuoct2014-1972960] Oracle Communications Application Remot DoS via Session Border Controller Component - CVE-2014-6465, Medium
Misc.: 🔍
See also: 🔍
Entry
Created: 10/15/2014 13:40Updated: 06/08/2017 20:35
Changes: 10/15/2014 13:40 (65), 06/08/2017 20:35 (5)
Complete: 🔍
Cache ID: 216:184:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.