Oracle releases Critical Patch Update
Posted on 17 July 2013.
Relatively quiet Critical Patch Update (CPU) from Oracle this quarter. Relative is of course subjective to Oracle, since this gigantic pile of unrelated code fixes includes 89 distinct CVEs and touches 20+ distinct products.

The highest risk issue is scored with a CVSS of 9 because itís remotely exploitable without authentication. This vulnerability in the XML Parser in Oracleís Database Server is part of a mixed bag of other vulnerabilities ranging from mild to serious.

Oracle Fusion middleware is seeing a lot of attention this quarter with 21 fixes, but nothing super critical. The highest CVSS score is 7.5.

Solaris is hit with two remote DoS attacks, plus a couple of local elevation of privilege issues.

With such a diverse range of products in this quarterís patch, it's hard to tackle these from top to bottom with recommendations. I recommend patching any vulnerable Oracle Database Server instances ASAP and donít neglect the stability or integrity of the Solaris deployment.


Ross Barrett, senior manager of security engineering at Rapid7.





Spotlight

Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Feb 8th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //