-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0178
                   Security Advisory: Oracle Siebel CRM
                              18 October 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Oracle Siebel CRM
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                      Modify Arbitrary Files          -- Remote with User Interaction
                      Denial of Service               -- Remote/Unauthenticated      
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-10333 CVE-2017-10315 CVE-2017-10302
                      CVE-2017-10300 CVE-2017-10264 CVE-2017-10263
                      CVE-2017-10162 CVE-2013-1903 
Member content until: Friday, November 17 2017
Reference:            ESB-2013.1275

OVERVIEW

        Multiple vulnerabilities have been identified in 
         Siebel Applications, versions  16.0,  17.0
        [1]


IMPACT

        The vendor has provided the following information regarding
        to the vulnerabilities:
        
        "This Critical Patch Update contains 8 new security fixes for
        Oracle Siebel CRM.   6 of these vulnerabilities may be
        remotely exploitable without authentication,  i.e.,  may be
        exploited over a network without requiring user credentials."
        [1]
        
        
        "CVE-2013-1903
        
        10.0
        
        AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        Apps - Field Service.  While the vulnerability is in Siebel
        Apps - Field Service, attacks may significantly impact
        additional products.  Successful attacks of this
        vulnerability can result in takeover of Siebel Apps - Field
        Service.
        
        CVE-2017-10263
        
        8.2
        
        AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        UI Framework.  Successful attacks require human interaction
        from a person other than the attacker and while the
        vulnerability is in Siebel UI Framework, attacks may
        significantly impact additional products. Successful attacks
        of this vulnerability can result in  unauthorized access to
        critical data or complete access to all Siebel UI Framework
        accessible data as well as  unauthorized update, insert or
        delete access to some of Siebel UI Framework accessible
        data.
        
        CVE-2017-10333
        
        7.4
        
        AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows low privileged
        attacker with network access via HTTP to compromise Siebel
        UI Framework.  While the vulnerability is in Siebel UI
        Framework, attacks may significantly impact additional
        products.  Successful attacks of this vulnerability can
        result in  unauthorized update, insert or delete access to
        some of Siebel UI Framework accessible data as well as
        unauthorized read access to a subset of Siebel UI Framework
        accessible data and unauthorized ability to cause a partial
        denial of service (partial DOS) of Siebel UI Framework.
        
        CVE-2017-10302
        
        6.1
        
        AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        UI Framework.  Successful attacks require human interaction
        from a person other than the attacker and while the
        vulnerability is in Siebel UI Framework, attacks may
        significantly impact additional products. Successful attacks
        of this vulnerability can result in  unauthorized update,
        insert or delete access to some of Siebel UI Framework
        accessible data as well as  unauthorized read access to a
        subset of Siebel UI Framework accessible data.
        
        CVE-2017-10315
        
        6.1
        
        AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        UI Framework.  Successful attacks require human interaction
        from a person other than the attacker and while the
        vulnerability is in Siebel UI Framework, attacks may
        significantly impact additional products. Successful attacks
        of this vulnerability can result in  unauthorized update,
        insert or delete access to some of Siebel UI Framework
        accessible data as well as  unauthorized read access to a
        subset of Siebel UI Framework accessible data.
        
        CVE-2017-10162
        
        5.4
        
        AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows low privileged
        attacker with network access via HTTP to compromise Siebel
        Core - Server Framework.  Successful attacks of this
        vulnerability can result in  unauthorized update, insert or
        delete access to some of Siebel Core - Server Framework
        accessible data as well as  unauthorized read access to a
        subset of Siebel Core - Server Framework accessible data.
        
        CVE-2017-10300
        
        5.3
        
        AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        CRM Desktop.  Successful attacks of this vulnerability can
        result in  unauthorized read access to a subset of Siebel
        CRM Desktop accessible data.
        
        CVE-2017-10264
        
        5.3
        
        AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
        
        Supported versions that are affected are 16.0 and  17.0.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Siebel
        UI Framework.  Successful attacks of this vulnerability can
        result in unauthorized ability to cause a partial denial of
        service (partial DOS) of Siebel UI Framework."
        [2]


MITIGATION

        Oracle states:
        
        "Due to the threat posed by a successful attack, Oracle
        strongly recommends that customers apply CPU fixes as soon
        as possible. Until you apply the CPU fixes, it may be
        possible to reduce the risk of successful attack by blocking
        network protocols required by an attack. For attacks that
        require certain privileges or access to certain packages,
        removing the privileges or the ability to access the
        packages from users that do not need the privileges may help
        reduce the risk of successful attack. Both approaches may
        break application functionality, so Oracle strongly
        recommends that customers test changes on non-production
        systems. Neither approach should be considered a long-term
        solution as neither corrects the underlying problem." [1]


REFERENCES

        [1] Oracle Critical Patch Update Advisory - October 2017
            http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

        [2] Text Form of Oracle Critical Patch Update - October 2017 Risk
            Matrices
            http://www.oracle.com/technetwork/security-advisory/cpuoct2017verbose-3236627.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWebb64x+lLeg9Ub1AQizzA//RfKbfqShcRqCDFRn62FNwjJ70Pm27Ynq
FYZaJjU8lyD3BkxTpdFrzbsFyaOoKcDkZBbFuRxHBKS/JSL2Gq6eCLrORJuC0e0p
+2WSNigGnR2V3o5LuwjayMsRYSvRLesZhhmIP9CSGTJ0t0wv6bquad19oLntGv7m
LCb+/UMf/mtm1DRQGsh+giFfOUYIHEP77B7ee7dL37wNmVKoFmvBJOvvcBIG6xDj
ZEZJYFnLJEhrUMrcrWVpzWWWdUaZZNm6qdrsLCNsxLnAPwgnu7PbqMtM6hQWTuCB
ewh3ZX7N2Kl94uZo0HNX/+nrr6dztB0inpJyKIc0WNcIGRUVfaxmE6cqGPOLHMnB
U1kj7Rx9atIJn4N8WX0KkF0TvnS45Tocphx8r0EFsKQpoQRBelISdocxjSesG80J
u4v7GD4hR5Go1ODM4lvYilkAxIlx8iFegmwI9gB51CfG8HWggHa/PpS+WxfJuugL
VrSLZTzUjGV6jaFeSvTPc0KmoSvUMo7eYaSeFs1GTy1fZr4EHANXUEljW6OM6BtW
ZtqnRl9htpZBBH58tcRduAhDmlbJQnrBxrEbskxWxfJC8BXkGD5dME2skscEFQ+d
MvzPgOBMARrkYQa5Wt7TqwaOdBZM8LOg+vzcYSImPWhgCqmYnQUP4PMuF1Ctkdvh
ZTGFCfuHX3g=
=FnxQ
-----END PGP SIGNATURE-----