CVE-2022-27491 Affecting olcne-agent package, versions <0:1.5.12-5.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE7-OLCNEAGENT-5603449
- published 27 May 2023
- disclosed 6 Sep 2022
Introduced: 6 Sep 2022
CVE-2022-27491 Open this link in a new tabHow to fix?
Upgrade Oracle:7 olcne-agent to version 0:1.5.12-5.el7 or higher.
This issue was patched in ELSA-2023-12357.
NVD Description
Note: Versions mentioned in the description apply only to the upstream olcne-agent package and not the olcne-agent package as distributed by Oracle.
See How to fix? for Oracle:7 relevant fixed versions and status.
A improper verification of source of a communication channel in Fortinet FortiOS with IPS engine version 7.201 through 7.214, 7.001 through 7.113, 6.001 through 6.121, 5.001 through 5.258 and before 4.086 allows a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim.
References
- https://linux.oracle.com/cve/CVE-2022-27491.html
- https://linux.oracle.com/errata/ELSA-2023-12354.html
- https://linux.oracle.com/errata/ELSA-2023-12355.html
- https://linux.oracle.com/errata/ELSA-2023-12356.html
- https://linux.oracle.com/errata/ELSA-2023-12357.html
- https://fortiguard.com/psirt/FG-IR-22-073