Oracle issues security patches in seven product lines

Share this article:

Oracle issued security updates Tuesday for 30 security vulnerabilities in seven of its product lines, as part of its regular quarterly patch cycle.

The patches fix vulnerabilities in the Oracle Database Server, Oracle Application Server, Oracle E-Business Suite and Applications, Oracle Enterprise Manager and Oracle Siebel Enterprise, according to the company. The patches also covered vulnerabilities in Oracle PeopleSoft and JDEdwards Suite and the Oracle BEA Products Suite, according to the Oracle update advisory.

“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible,” the advisory said.

The worst problems fixed had mainly to do with the ability to exploit a flaw without valid credentials. The highest severity rating (10.0) went to Jrockit, part of the Oracle BEA Products Suite, and Secure Backup HTTP, a component of the Oracle Database. Both of these components had vulnerabilities that could be remotely exploitable without authentication – that is, may be exploited over a network without the need for a username and password

"They [the patches] indicate a vulnerability in the network protocol layer," Amichai Shulman, chief technology officer at database security firm Imperva, told SCMagazineUS.com Wednesday in an email. "It's possible that the attack could go undetected. Since this is a protocol level attack, tools that monitor only SQL activity, native audit solutions, or solutions that have visibility only to internal host based activity, will not have any indication that the server is under attack."

Oracle offered some possible workarounds for organizations that cannot immediately apply the patches.

“It may be possible to reduce the risk of successful attack by restricting network protocols required by an attack,” the advisory said. “For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack.”

Unfortunately, both of these approaches may break application functionality, according to Oracle's advisory. It recommended that users test changes on nonproduction systems, and said neither approach should be considered a long-term solution.

The Oracle patches hit the same day as Microsoft fixed zero-day vulnerabilities in its DirectShow and Video ActiveX components. The next set of Oracle patches is due in October.



Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.