| CVE ID | CVE-2010-4417 | 
| CVSS SCORE | 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C | 
| AFFECTED VENDORS | Oracle | 
| AFFECTED PRODUCTS | Beehive | 
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10668']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Beehive. Authentication is not required to exploit this vulnerability. The specific flaw exists within 'voice-servlet/prompt-qa/Index.jspf'. During the creation of a file used for storing an evaluation parameter user supplied data is used to create a filename and another user specified field is later used to populate that file's contents. By inserting a null byte (0x00) into the filename the user can control the extension of the newly created file. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the oracle user. | 
| ADDITIONAL DETAILS | Oracle has issued an update to correct this vulnerability. More details can be found at: http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | 1c239c43f521145fa8385d64a9c32243 of unsecurityresearch.com |