U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-3137

Change History

Modified Analysis by NIST 8/30/2016 10:10:01 AM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*
Configuration 1
     OR
          *cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:10.2.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.2:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.3:*:*:*:*:*:*:*
          *cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4:*:*:*:*:*:*:*
Changed Reference Type
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ No Types Assigned
http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ Press/Media Coverage
Changed Reference Type
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular No Types Assigned
http://threatpost.com/en_us/blogs/flaw-oracle-logon-protocol-leads-easy-password-cracking-092012?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular Press/Media Coverage
Changed Reference Type
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html No Types Assigned
http://www.darkreading.com/authentication/167901072/security/application-security/240007643/attack-easily-cracks-oracle-database-passwords.html Press/Media Coverage
Changed Reference Type
http://www.exploit-db.com/exploits/22069 No Types Assigned
http://www.exploit-db.com/exploits/22069 Third Party Advisory, VDB Entry, Exploit
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Vendor Advisory, Patch
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Vendor Advisory, Patch