Date: 15 July 2009
References: ESB-2009.1078 ESB-2009.1123 ESB-2009.1132.4 ESB-2009.1430.3 ASB-2010.0168 ESB-2010.0630.3
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT Security Bulletin
ASB-2009.1013
Oracle Critical Patch Update Advisory - July 2009
15 July 2009
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Oracle Database 11g
Oracle Database 10g
Oracle Database 9i
Oracle Application Server 10g
Oracle Identity Management 10g
Oracle E-Business Suite Release 12
Oracle E-Business Suite Release 11i
Oracle Enterprise Manager Database Control 11
Oracle Enterprise Manager Grid Control 10g
PeopleSoft Enterprise PeopleTools
PeopleSoft Enterprise HRMS
Siebel Highly Interactive Client
Oracle WebLogic Server
Oracle Complex Event Processing
WebLogic Event Server 2.0
Oracle JRockit
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution: Patch
CVE Names: CVE-2009-0217 CVE-2009-0987 CVE-2009-1015
CVE-2009-1019 CVE-2009-1020 CVE-2009-1021
CVE-2009-1094 CVE-2009-1523 CVE-2009-1963
CVE-2009-1966 CVE-2009-1967 CVE-2009-1968
CVE-2009-1969 CVE-2009-1970 CVE-2009-1973
CVE-2009-1974 CVE-2009-1975 CVE-2009-1976
CVE-2009-1977 CVE-2009-1978 CVE-2009-1980
CVE-2009-1981 CVE-2009-1982 CVE-2009-1983
CVE-2009-1984 CVE-2009-1986 CVE-2009-1987
CVE-2009-1988 CVE-2009-1989
Member content until: Friday, August 14 2009
OVERVIEW
Oracle have published information regarding the July 2009
Critical Patch Update which contains 30 security fixes affecting
hundreds of Oracle products [1].
IMPACT
Specific impacts have not been published by Oracle at this time
however the following information regarding CVSS 2.0 scoring and
affected products is available from the Oracle site [1]:
The highest CVSS 2.0 base score of vulnerabilities across all
products is 10.0 (These vulnerabilities affect Oracle Secure Backup
and JRockit).
Oracle have also stated that 15 of these vulnerabilities are
remotely exploitable with no user authentication required. [1]
The following products are reported by Oracle as vulnerable:
- Oracle Database 11g, version 11.1.0.6, 11.1.0.7
- Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4
- Oracle Database 10g, version 10.1.0.5
- Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV
- Oracle Application Server 10g Release 2 (10.1.2), version
10.1.2.3.0
- Oracle Application Server 10g Release 3 (10.1.3), versions
10.1.3.3.0, 10.1.3.4.0
- Oracle Identity Management 10g, version 10.1.4.0.1, 10.1.4.2.0,
10.1.4.3.0
- Oracle E-Business Suite Release 12, version 12.1
- Oracle E-Business Suite Release 12, version 12.0.6
- Oracle E-Business Suite Release 11i, version 11.5.10.2
- Oracle Enterprise Manager Database Control 11, version 11.1.0.6,
11.1.0.7
- Oracle Enterprise Manager Grid Control 10g Release 4, version
10.2.0.4
- PeopleSoft Enterprise PeopleTools versions: 8.49
- PeopleSoft Enterprise HRMS versions: 8.9 and 9.0
- Siebel Highly Interactive Client versions: 7.5.3, 7.7.2, 7.8,
8.0, 8.1
- Oracle WebLogic Server 10.3, 10.0MP1
- Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 through 9.2 MP3
- Oracle WebLogic Server 8.1 through 8.1 SP6
- Oracle WebLogic Server 7.0 through 7.0 SP7
- Oracle Complex Event Processing 10.3 and WebLogic Event Server
2.0
- Oracle JRockit R27.6.3 and earlier (JDK/JRE 6, 5, 1.4.2)
MITIGATION
Administrators responsible for vulnerable products are advised to
apply these patches as soon as is practical.
REFERENCES
[1] Oracle Critical Patch Update Advisory - July 2009
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFKXTecNVH5XJJInbgRAu8XAJ0YmGZ6OJ5KBOAZq19MiPl1Iv05GQCdHyxA
D1F63K6hrLe8CWmfj1SLQQo=
=GSwm
-----END PGP SIGNATURE-----
|