Risk
4/14/2008
01:13 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Oracle Plans 41 Patches For Tuesday

The number of published proof-of-concept exploits for Oracle products last year supports research noting an increase in attacks on applications.

Oracle said last week that it will be releasing patches for 41 vulnerabilities in its database software products on Tuesday, April 15.

The Critical Patch Update contains 17 security fixes for the Oracle Database, three security fixes for Oracle Application Server, 11 security fixes for the Oracle E-Business Suite, one security fix for the Oracle Enterprise Manager, three security fixes for Oracle PeopleSoft Enterprise products, and six security fixes for Oracle Siebel SimBuilder products.

Of these, 15 can be exploited remotely without authentication.

The following Oracle products are affected: Oracle Database 11g, version 11.1.0.6; Database 10g Release 2, versions 10.2.0.2, 10.2.0.3; Oracle Database 10g, version 10.1.0.5; Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV; Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.1.0, 10.1.3.3.0; Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0; Oracle Application Server 10g (9.0.4), version 9.0.4.3 Oracle Collaboration Suite 10g, version 10.1.2; Oracle E-Business Suite Release 12, versions 12.0.0 - 12.0.4; Oracle E-Business Suite Release 11i, versions 11.5.9 - 11.5.10 CU2; Oracle PeopleSoft Enterprise PeopleTools versions 8.22.19, 8.48.16, 8.49.09; Oracle PeopleSoft Enterprise HCM versions 8.8 SP1, 8.9, 9.0; Oracle Siebel SimBuilder versions 7.8.2, 7.8.5

Security researchers have noted that cyber attacks now tend to focus more on applications than on operating system or network vulnerabilities. The number of published proof-of-concept exploits for Oracle products last year, compared to previous years, seems to support that contention.

Mil0worm.com, a security vulnerability site, listed 21 proof-of-concept exploits for Oracle software in 2007, compared to 5 in 2006 and 3 in 2005. So far in 2008, the site lists 4 Oracle-related vulnerabilities.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-2721
Published: 2015-07-05
Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attacke...

CVE-2015-2722
Published: 2015-07-05
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.

CVE-2015-2724
Published: 2015-07-05
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code v...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report