{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle Enterprise Manager Grid Control 10g ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Application Server 10g ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle E-business Suite 11i et 12 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Peoplesoft Enterprise HRMS ;","product":{"name":"PeopleSoft","vendor":{"name":"Oracle","scada":false}}},{"description":"Client Oracle SQL*Plus ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server, versions 7.x \u00e0 10. x ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 9i, 10g et 11g ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Secure Backup version 10.x ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"JD Edwards Tools ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle TimesTen In-Memory Database version 7.x ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Portal, versions 8.x \u00e0 10. x.","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Collaboration Suite 10g ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\n-   Huit vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance apr\u00e8s authentification,\n    affectent les bases de donn\u00e9es (Oracle Database). Elles permettent\n    de porter atteinte \u00e0 l'int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 ou \u00e0 la\n    disponibilit\u00e9 des donn\u00e9es ;\n-   deux vuln\u00e9rabilit\u00e9s affectent les clients SQL\\*Plus et permettent de\n    porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es ;\n-   neuf vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance sans authentification,\n    concernent Oracle Secure Backup. Quatre d'entre elles ne permettent\n    qu'un d\u00e9ni de service. Les autres portent en plus atteinte \u00e0\n    l'int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9 des donn\u00e9es ;\n-   une vuln\u00e9rabilit\u00e9 affecte la base de donn\u00e9es r\u00e9sidente en m\u00e9moire,\n    Oracle TimesTen In-Memory Database. Elle permet de porter atteinte \u00e0\n    l'int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 et \u00e0 la disponibilit\u00e9 des donn\u00e9es\n    ;\n-   quatre vuln\u00e9rabilit\u00e9s, dont trois sont exploitables sans\n    authentification, affectent Oracle Application Server. Elles\n    permettent de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l'int\u00e9grit\u00e9\n    des donn\u00e9es. Trois d'entre elles sont exploitables \u00e0 distance ;\n-   une vuln\u00e9rabilit\u00e9 de Oracle Collaboration Suite permet, \u00e0 distance,\n    \u00e0 un utilisateur authentifi\u00e9 de lire ind\u00fbment des donn\u00e9es ;\n-   quatre vuln\u00e9rabilit\u00e9s, dont une est exploitable sans\n    authentification, sont pr\u00e9sentes dans Oracle E-business Suite. Elles\n    permettent de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l'int\u00e9grit\u00e9\n    des donn\u00e9es. Trois d'entre elles sont exploitables \u00e0 distance ;\n-   une vuln\u00e9rabilit\u00e9 concerne Oracle Enterprise Manager Grid Control.\n    Elle permet \u00e0 un utilisateur authentifi\u00e9 d'acc\u00e9der \u00e0 distance \u00e0 des\n    donn\u00e9es ;\n-   cinq vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans PeopleSoft. Elles permettent\n    \u00e0 un utilisateur authentifi\u00e9 de porter atteinte, \u00e0 distance, \u00e0\n    l'int\u00e9grit\u00e9, \u00e0 la confidentialit\u00e9 ou \u00e0 la disponibilit\u00e9 des donn\u00e9es\n    ;\n-   une vuln\u00e9rabilit\u00e9 de JD Edwards Tools permet \u00e0 un utilisateur\n    authentifi\u00e9 de lire ind\u00fbment des donn\u00e9es, \u00e0 distance ;\n-   quatre vuln\u00e9rabilit\u00e9s, exploitables \u00e0 distance et sans\n    authentification, affectent Oracle WebLogic Server. Elles permettent\n    de porter atteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l'int\u00e9grit\u00e9 des\n    donn\u00e9es.\n-   une vuln\u00e9rabilit\u00e9, exploitable \u00e0 distance et sans authentification,\n    affecte Oracle WebLogic Portal. Elle permet de porter atteinte \u00e0 la\n    confidentialit\u00e9 et \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2008-3999","url":"https://www.cve.org/CVERecord?id=CVE-2008-3999"},{"name":"CVE-2008-4015","url":"https://www.cve.org/CVERecord?id=CVE-2008-4015"},{"name":"CVE-2008-5445","url":"https://www.cve.org/CVERecord?id=CVE-2008-5445"},{"name":"CVE-2008-5459","url":"https://www.cve.org/CVERecord?id=CVE-2008-5459"},{"name":"CVE-2008-4014","url":"https://www.cve.org/CVERecord?id=CVE-2008-4014"},{"name":"CVE-2008-5460","url":"https://www.cve.org/CVERecord?id=CVE-2008-5460"},{"name":"CVE-2008-4007","url":"https://www.cve.org/CVERecord?id=CVE-2008-4007"},{"name":"CVE-2008-5457","url":"https://www.cve.org/CVERecord?id=CVE-2008-5457"},{"name":"CVE-2008-5454","url":"https://www.cve.org/CVERecord?id=CVE-2008-5454"},{"name":"CVE-2008-5458","url":"https://www.cve.org/CVERecord?id=CVE-2008-5458"},{"name":"CVE-2008-2623","url":"https://www.cve.org/CVERecord?id=CVE-2008-2623"},{"name":"CVE-2008-5436","url":"https://www.cve.org/CVERecord?id=CVE-2008-5436"},{"name":"CVE-2008-5451","url":"https://www.cve.org/CVERecord?id=CVE-2008-5451"},{"name":"CVE-2008-5438","url":"https://www.cve.org/CVERecord?id=CVE-2008-5438"},{"name":"CVE-2008-5443","url":"https://www.cve.org/CVERecord?id=CVE-2008-5443"},{"name":"CVE-2008-5442","url":"https://www.cve.org/CVERecord?id=CVE-2008-5442"},{"name":"CVE-2008-3981","url":"https://www.cve.org/CVERecord?id=CVE-2008-3981"},{"name":"CVE-2008-3978","url":"https://www.cve.org/CVERecord?id=CVE-2008-3978"},{"name":"CVE-2008-5437","url":"https://www.cve.org/CVERecord?id=CVE-2008-5437"},{"name":"CVE-2008-5455","url":"https://www.cve.org/CVERecord?id=CVE-2008-5455"},{"name":"CVE-2008-5439","url":"https://www.cve.org/CVERecord?id=CVE-2008-5439"},{"name":"CVE-2008-5444","url":"https://www.cve.org/CVERecord?id=CVE-2008-5444"},{"name":"CVE-2008-4016","url":"https://www.cve.org/CVERecord?id=CVE-2008-4016"},{"name":"CVE-2008-5447","url":"https://www.cve.org/CVERecord?id=CVE-2008-5447"},{"name":"CVE-2008-5463","url":"https://www.cve.org/CVERecord?id=CVE-2008-5463"},{"name":"CVE-2008-3974","url":"https://www.cve.org/CVERecord?id=CVE-2008-3974"},{"name":"CVE-2008-5450","url":"https://www.cve.org/CVERecord?id=CVE-2008-5450"},{"name":"CVE-2008-5446","url":"https://www.cve.org/CVERecord?id=CVE-2008-5446"},{"name":"CVE-2008-3997","url":"https://www.cve.org/CVERecord?id=CVE-2008-3997"},{"name":"CVE-2008-5462","url":"https://www.cve.org/CVERecord?id=CVE-2008-5462"},{"name":"CVE-2008-5440","url":"https://www.cve.org/CVERecord?id=CVE-2008-5440"},{"name":"CVE-2008-3979","url":"https://www.cve.org/CVERecord?id=CVE-2008-3979"},{"name":"CVE-2008-5456","url":"https://www.cve.org/CVERecord?id=CVE-2008-5456"},{"name":"CVE-2008-4006","url":"https://www.cve.org/CVERecord?id=CVE-2008-4006"},{"name":"CVE-2008-3973","url":"https://www.cve.org/CVERecord?id=CVE-2008-3973"},{"name":"CVE-2008-5452","url":"https://www.cve.org/CVERecord?id=CVE-2008-5452"},{"name":"CVE-2008-5461","url":"https://www.cve.org/CVERecord?id=CVE-2008-5461"},{"name":"CVE-2008-5448","url":"https://www.cve.org/CVERecord?id=CVE-2008-5448"},{"name":"CVE-2008-4017","url":"https://www.cve.org/CVERecord?id=CVE-2008-4017"},{"name":"CVE-2008-5449","url":"https://www.cve.org/CVERecord?id=CVE-2008-5449"},{"name":"CVE-2008-5441","url":"https://www.cve.org/CVERecord?id=CVE-2008-5441"}],"links":[],"reference":"CERTA-2009-AVI-013","revisions":[{"description":"version initiale.","revision_date":"2009-01-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s affectent les produits Oracle. Elles permettent\n\u00e0 un utilisateur malveillant de porter atteinte \u00e0 l'int\u00e9grit\u00e9, \u00e0 la\nconfidentialit\u00e9 ou \u00e0 la disponibilit\u00e9 des donn\u00e9es.\n","title":"Vuln\u00e9rabilit\u00e9s des produits Oracle","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle du 13 janvier 2009","url":"http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html"}]}
