Risk
10/16/2013
10:21 AM
50%
50%

Oracle Issues Massive Security Patch For Java, Databases

Oracle's quarterly update includes 127 security patches, including fixes for remotely exploitable Java flaws.

Oracle on Tuesday released 127 security fixes for its products, including 51 patches for Java, as part of its quarterly critical patch update (CPU).

"Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible," according to the distribution page for the fixes.

Vulnerabilities detailed in the security bulletin affect all versions of Java (versions 5, 6 and 7), as well as Oracle Database 11g and 12c, Fusion Middleware, Enterprise Manager, E-Business Suite, Flexcube Products Suite, Oracle's Health Sciences and Retail Products suites, Primavera, PeopleSoft, Siebel and MySQL.

While Oracle's critical patch update fixes only recent versions of many of those programs, the company said that older, unsupported versions may have the same bugs. "It is likely that earlier versions of affected releases are also affected by these vulnerabilities," Oracle said. "As a result, customers are recommended to upgrade to supported versions."

[ For more Oracle news, see Oracle OpenWorld: 5 Rants And Raves . ]

Which bugs should information security managers squash first? "All of these updates are important, but arguably Java is the most important of all of them," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

Indeed, of the 51 Java patches, 50 involve remotely exploitable vulnerabilities, and an equal number of flaws affect Java applets or Java WebStart, which allows Java apps to be run from the browser. Finally, 12 of the Java bugs score a "10" on the CVSSv2 vulnerability index, meaning they can be remotely exploited by an attacker to seize full control of a PC.

The Java vulnerabilities affect both client-side and server-side Java. "The majority of vulnerabilities are concentrated on the Java client side, i.e. in desktop/laptop deployments, with the most common attack vector being Web browsing and malicious Web pages," said Wolfgang Kandek, CTO of Qualys, in a blog post. "But there are two highly critical vulnerabilities that also apply to server installations -- CVE-2013-5782 and CVE-2013-5830."

Java 7 update 45 is now the latest version of the software. "You should update as quickly as possible on your desktop and laptop machines," said Kandek.

For people still using Java 6 -- or any prior version -- the security advice is to upgrade immediately, or else take steps to safeguard the machine, especially since related attacks will no doubt start soon. "Java 6 is also vulnerable to 11 of the 12 highly critical vulnerabilities, but there are no more public patches for Java 6," Kandek said. "The recommended action for Java 6 here is to upgrade to Java 7, if possible. If you cannot upgrade, I would recommend [that you] isolate the machine that needs Java 6 running and not use it for any other activities that connect it to the Internet, such as e-mail and browsing."

The Java 7 patches are good news for businesses and consumers that still rely on the Web browser plug-in, and Wisniewski at Sophos lauded Oracle's decision to patch all of its products -- including Java -- at the same time. "This is the first time Oracle is patching Java on the same quarterly cycle as other products, and perhaps the first time I have had something positive to say about Oracle security," he said.

On that note, however, he also argued that Oracle still has a long way to go to get its security house in order, despite the company having already delayed the release of Java 8 in April to dedicate more resources on improving Java 7 security.

"I heard that Oracle won the America's Cup recently which leads me to give them some unsolicited advice," said Wisniewski. "Put the award on the shelf in your lobby, sell the $10 million dollar boat and hire the engineers needed to update the Java patch cycle to monthly with the spare cash. Three-plus billion devices will thank you."

Oracle's next quarterly patch update is scheduled for January 14, 2014.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Zman7
50%
50%
Zman7,
User Rank: Apprentice
10/16/2013 | 5:42:46 PM
re: Oracle Issues Massive Security Patch For Java, Databases
It's sad that all this time and effort has to be wasted on security instead of productive things - all because of idiots and criminals in the world.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report