{"vuid":"VU#298958","idnumber":"298958","name":"Oracle Diagnostic Tools do not properly authenticate users","keywords":["Oracle","Diagnostics Support Pack","security bypass","E-Business"],"overview":"Oracle Diagnostic Tools fail to properly authenticate users before granting access to tools and tool resources. This may allow a remote, unauthenticated attacker to access and execute diagnostic tools on an Oracle E-Business Suite installation.","clean_desc":"Oracle Diagnostic Tools Oracle Diagnostic Tools is a collection of troubleshooting tools and routines for Oracle E-Business Suite 11i. For more information on specific features of Oracle Diagnostic Tools, please refer to  Metalink Note ID 179661.1. The Problem Oracle Diagnostic Tools fail to properly authenticate users before granting them access to diagnostic tools. In some cases, there is no authentication done before access to a diagnostic tool is granted. Considerations Certain Oracle Diagnostic Tools are accessible over a network. In addition, the patch to correct this problem addresses other vulnerabilities in Oracle.","impact":"A remote, unauthenticated attacker may be able to access and run Oracle Diagnostic tools. Depending on the tool being accessed, this may allow the attacker to modify Oracle E-Business Suite settings or obtain sensitive information about an Oracle E-Business Suite installation.","resolution":"Apply an update\nOracle has corrected this issue in Oracle Diagnostics Support Pack for February 2006. This update is available in Oracle Metalink 167000.1.","workarounds":"","sysaffected":"","thanks":"Information in this document came from \nIntegrigy","author":"This document was written by Jeff Gennari.","public":["http://www.integrigy.com/info/IntegrigySecurityAnalysis-OracleDiag0206.pdf","http://metalink.oracle.com/metalink/plsql/showdoc?db=NOT&id=167000.1","http://metalink.oracle.com/metalink/plsql/showdoc?db=NOT&id=179661.1"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-28T20:26:11Z","publicdate":"2006-02-24T00:00:00Z","datefirstpublished":"2006-03-03T12:45:31Z","dateupdated":"2006-03-09T12:50:39Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"15.3","cam_scorecurrentwidelyknown":"19.8","cam_scorecurrentwidelyknownexploited":"37.8","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.3,"vulnote":null}