Risk
4/14/2008
01:13 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Oracle Plans 41 Patches For Tuesday

The number of published proof-of-concept exploits for Oracle products last year supports research noting an increase in attacks on applications.

Oracle said last week that it will be releasing patches for 41 vulnerabilities in its database software products on Tuesday, April 15.

The Critical Patch Update contains 17 security fixes for the Oracle Database, three security fixes for Oracle Application Server, 11 security fixes for the Oracle E-Business Suite, one security fix for the Oracle Enterprise Manager, three security fixes for Oracle PeopleSoft Enterprise products, and six security fixes for Oracle Siebel SimBuilder products.

Of these, 15 can be exploited remotely without authentication.

The following Oracle products are affected: Oracle Database 11g, version 11.1.0.6; Database 10g Release 2, versions 10.2.0.2, 10.2.0.3; Oracle Database 10g, version 10.1.0.5; Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV; Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.1.0, 10.1.3.3.0; Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0; Oracle Application Server 10g (9.0.4), version 9.0.4.3 Oracle Collaboration Suite 10g, version 10.1.2; Oracle E-Business Suite Release 12, versions 12.0.0 - 12.0.4; Oracle E-Business Suite Release 11i, versions 11.5.9 - 11.5.10 CU2; Oracle PeopleSoft Enterprise PeopleTools versions 8.22.19, 8.48.16, 8.49.09; Oracle PeopleSoft Enterprise HCM versions 8.8 SP1, 8.9, 9.0; Oracle Siebel SimBuilder versions 7.8.2, 7.8.5

Security researchers have noted that cyber attacks now tend to focus more on applications than on operating system or network vulnerabilities. The number of published proof-of-concept exploits for Oracle products last year, compared to previous years, seems to support that contention.

Mil0worm.com, a security vulnerability site, listed 21 proof-of-concept exploits for Oracle software in 2007, compared to 5 in 2006 and 3 in 2005. So far in 2008, the site lists 4 Oracle-related vulnerabilities.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!