CVE-2016-0691

Published on: 04/21/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Certain versions of Database from Oracle contain the following vulnerability:

Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect integrity via unknown vectors, a different vulnerability than CVE-2016-0690.

  • CVE-2016-0691 has been assigned by [email protected] to track the vulnerability - currently rated as LOW severity.

CVSS3 Score: 3.3 - LOW

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE LOW NONE

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Oracle Critical Patch Update Advisory - April 2016 Vendor Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
Oracle Database Multiple Flaws Let Remote Users Deny Service, Remote and Local Users Gain Elevated Privileges, and Local Users Modify Data - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035590

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleDatabase11.2.0.4AllAllAll
ApplicationOracleDatabase12.1.0.1AllAllAll
ApplicationOracleDatabase12.1.0.2AllAllAll
ApplicationOracleDatabase11.2.0.4AllAllAll
ApplicationOracleDatabase12.1.0.1AllAllAll
ApplicationOracleDatabase12.1.0.2AllAllAll
  • cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:database:12.1.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:database:12.1.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*: