Network Security, Patch/Configuration Management, Vulnerability Management

Oracle issues security patches in seven product lines

Oracle issued security updates Tuesday for 30 security vulnerabilities in seven of its product lines, as part of its regular quarterly patch cycle.

The patches fix vulnerabilities in the Oracle Database Server, Oracle Application Server, Oracle E-Business Suite and Applications, Oracle Enterprise Manager and Oracle Siebel Enterprise, according to the company. The patches also covered vulnerabilities in Oracle PeopleSoft and JDEdwards Suite and the Oracle BEA Products Suite, according to the Oracle update advisory.

“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible,” the advisory said.

The worst problems fixed had mainly to do with the ability to exploit a flaw without valid credentials. The highest severity rating (10.0) went to Jrockit, part of the Oracle BEA Products Suite, and Secure Backup HTTP, a component of the Oracle Database. Both of these components had vulnerabilities that could be remotely exploitable without authentication – that is, may be exploited over a network without the need for a username and password

"They [the patches] indicate a vulnerability in the network protocol layer," Amichai Shulman, chief technology officer at database security firm Imperva, told SCMagazineUS.com Wednesday in an email. "It's possible that the attack could go undetected. Since this is a protocol level attack, tools that monitor only SQL activity, native audit solutions, or solutions that have visibility only to internal host based activity, will not have any indication that the server is under attack."

Oracle offered some possible workarounds for organizations that cannot immediately apply the patches.

“It may be possible to reduce the risk of successful attack by restricting network protocols required by an attack,” the advisory said. “For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack.”

Unfortunately, both of these approaches may break application functionality, according to Oracle's advisory. It recommended that users test changes on nonproduction systems, and said neither approach should be considered a long-term solution.

The Oracle patches hit the same day as Microsoft fixed zero-day vulnerabilities in its DirectShow and Video ActiveX components. The next set of Oracle patches is due in October.



Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.