Oracle Data Control ORADC ActiveX Control Code Execution
Publish Date: 15 février 2011
Gravité: : Medium
Date du conseil: 15 février 2011
Description
There exists a code execution vulnerability in the Oracle ORADC ActiveX control. The vulnerability is caused due to improper validation of the state before performing specific operations of the the vulnerable ActvieX control name ORADC.ORADCCtrl. A remote attacker may leverage the vulnerability to to inject and execute arbitrary code in the security context of the currently logged user.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1000951
Trend Micro Deep Security DPI Rule Name: 1000951 - Oracle Data Control ORADC ActiveX Control Code Execution
Affected software and version:
- Oracle Objects for OLE 0