Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-6015
Deferred
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-22 Jan, 2016 | 15:59
Updated At-12 Apr, 2025 | 10:46

Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CVE-2015-6014, and CVE-2016-0432. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this issue is a stack-based buffer overflow in Oracle Outside In 8.5.2 and earlier, which allows remote attackers to execute arbitrary code via a crafted Paradox DB file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Oracle Corporation
oracle
>>outside_in_technology>>8.5.0
cpe:2.3:a:oracle:outside_in_technology:8.5.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>outside_in_technology>>8.5.1
cpe:2.3:a:oracle:outside_in_technology:8.5.1:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>outside_in_technology>>8.5.2
cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

CVSSv2 score based on information provided by https://www.kb.cert.org/vuls/id/916896. Score may vary based on implementation.
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlcret@cert.org
Vendor Advisory
http://www.securityfocus.com/bid/81243cret@cert.org
N/A
http://www.securitytracker.com/id/1034711cret@cert.org
N/A
https://www.kb.cert.org/vuls/id/916896cret@cert.org
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/81243af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1034711af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.kb.cert.org/vuls/id/916896af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Source: cret@cert.org
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/81243
Source: cret@cert.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id/1034711
Source: cret@cert.org
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/916896
Source: cret@cert.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/81243
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securitytracker.com/id/1034711
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/916896
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Change History
0Changes found

Details not found