Oracle Communications Session Border Controller 8.2.0

CPE Details

Oracle Communications Session Border Controller 8.2.0
8.2.0
2019-06-03
14h26 +00:00
2022-09-12
11h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*

Informations

Vendor

oracle

Product

communications_session_border_controller

Version

8.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-10722 2020-05-19 16h04 +00:00 A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
6.7
Medium
CVE-2020-10723 2020-05-19 16h02 +00:00 A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
6.7
Medium
CVE-2018-16865 2019-01-11 20h00 +00:00 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
7.8
High
CVE-2018-16864 2019-01-11 19h00 +00:00 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
7.8
High
CVE-2018-11236 2018-05-18 14h00 +00:00 stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
9.8
Critical
CVE-2018-11237 2018-05-18 14h00 +00:00 An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
7.8
High
CVE-2018-6485 2018-02-01 13h00 +00:00 An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
9.8
Critical