Oracle Critical Patch Update - April 2007

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. Due to the threat posed by a successful attack, Oracle strongly recommends that fixes are applied as soon as possible. This Critical Patch Update contains 36 new security fixes across all products.

Supported Products and Components Affected

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in [square brackets] following the product versions. Please click on the link in [square brackets] or in the Patch Availability Table to access the documentation for those patches.

Category I

Product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support policy; or Error Correction Support (ECS) or Extended Maintenance Support (EMS), under the previous support policy:

• Oracle Database 10g Release 2, versions 10.2.0.2, 10.2.0.3     [ Database ]
• Oracle Database 10g Release 1, versions 10.1.0.4, 10.1.0.5     [ Database ]
• Oracle9i Database Release 2, versions 9.2.0.7, 9.2.0.8     [ Database ]
• Oracle Secure Enterprise Search 10g Release 1, version 10.1.6     [ Secure Enterprise Search (OTN) ]
• Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.0.0, 10.1.3.1.0, 10.1.3.2.0     [ Application Server ]
• Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.1 - 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0     [ Application Server ]
• Oracle Application Server 10g (9.0.4), version 9.0.4.3     [ Application Server ]
• Oracle10g Collaboration Suite Release 1, version 10.1.2     [ Collaboration Suite ]
• Oracle E-Business Suite Release 11i, versions 11.5.7 - 11.5.10 CU2     [ E-Business Suite ]
• Oracle E-Business Suite Release 12, version 12.0.0     [ E-Business Suite ]
• Oracle Enterprise Manager 9i Release 2, versions 9.2.0.7, 9.2.0.8     [ Enterprise Manager ]
• Oracle PeopleSoft Enterprise PeopleTools versions 8.22, 8.47, 8.48     [ PeopleSoft/JDE ]
• Oracle PeopleSoft Enterprise Human Capital Management version 8.9     [ PeopleSoft/JDE ]
• JD Edwards EnterpriseOne Tools version 8.96     [ PeopleSoft/JDE ]
• JD Edwards OneWorld Tools SP23     [ PeopleSoft/JDE ]

Category II

Products and components that are bundled with the products listed in Category I.
No products in this category are affected by the fixes included in this Critical Patch Update.

Category III

Products that are de-supported as a standalone installation but are supported when installed with the products listed in Category I:

• Oracle9i Database Release 1, version 9.0.1.5 FIPS+     [ Application Server ]

Patches for Category III products are only available when these products are installed as part of Category I products, and are tested solely on supported configurations and environments. Please refer to the documentation for each product for specific details concerning the support and availability of patches.

Category IV

Products that are supported only on selected platforms. Please consult the additional documentation for details.

• Oracle9i Database Release 2, version 9.2.0.5     [ Database ]
• Oracle Database 10g Release 2, version 10.2.0.1     [ Database ]

Patch Availability Table and Risk Matrices

The Oracle Database, Oracle Application Server, Oracle Enterprise Manager Grid Control, Oracle Collaboration Suite, Oracle E-Business Suite Applications (Release 12 only), JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications and PeopleSoft Enterprise PeopleTools patches in the Updates are cumulative; each Critical Patch Update contains the fixes from the previous Critical Patch Updates.

Oracle E-Business Suite Applications Release 11i patches are not cumulative, so Oracle E-Business Suite Applications customers should refer to previous Critical Patch Updates to identify previous fixes they want to apply.

For each Oracle product being administered, please consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2007 Documentation Map, MetaLink Note 420060.1.

Product Risk Matrix Patch Availability and Installation Information
Oracle Database Appendix A - Oracle Database Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 420061.1
Oracle Application Server Appendix B - Oracle Application Server Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 420061.1
Oracle Collaboration Suite Appendix C - Oracle Collaboration Suite Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 420061.1
Oracle E-Business Suite and Applications Appendix D - Oracle E-Business Suite and Applications Risk Matrix E-Business Suite Critical Patch Update Note, MetaLink Note 420072.1
Oracle Enterprise Manager Appendix E - Enterprise Manager Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 420061.1
Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Appendix F - Oracle PeopleSoft and JD Edwards Applications Risk Matrix Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Advisories


Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous fixes can be found in previous Critical Patch Update advisories.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. The same vulnerability appears with the same Vuln # in all risk matrices. Italics indicate vulnerabilities in code included from other product areas.

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU) or a Security Alert. Results of the security analysis are reflected in the associated documentation describing, for example, the type of vulnerability, the conditions required to exploit it and the result of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit. Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the CPU or Security Alert notification, the Patch Availability Matrix, the readme files, and FAQs. Oracle does not provide advance notification on CPU or Security Alerts to individual customers. Finally, Oracle distributes neither exploit code nor “proof-of-concept” code for product vulnerabilities.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that fixes are applied as soon as possible. Depending on your environment, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends changes are tested on non-production systems. Neither approach should be considered a long term solution as neither corrects the underlying problem.

Unsupported Products and De-Supported Versions

Unsupported products, releases and versions are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier patch sets of affected releases are also affected by these vulnerabilities.

Supported products are patched in accordance with the Critical Patch Update policy summarized in the CPU Frequently Asked Questions document linked from the References section.

Critical Patch Update patches are available for customers who have purchased Extended Maintenance Support (EMS) before the implementation of the Lifetime Support Policy. De-support Notices indicate whether EMS is available for a particular release and platform, as well as the specific period during which EMS will be available.

Customers with valid licenses for product versions covered by Extended Support (ES), before the implementation of the Lifetime Support Policy, are entitled to download existing fixes; but new issues that may arise from the application of patches are not covered under ES. Therefore, ES customers should have comprehensive plans to enable removal of any applied patch.

Critical Patch Update patches are not provided for product versions which are no longer covered under the Extended Maintenance Support plan or the Lifetime Support Policy. We recommend that customers upgrade to the latest supported version of Oracle products in order to obtain patches.

Please review the "Extended Support" section within the Technical Support Policies for further guidelines regarding ES and EMS.

Advance Notice of On Request Model for Oracle Database and Oracle Application Server

In order to provide enhanced support to our customers, Oracle will proactively create patches only for platform/version combinations that, based on historical data, customers will download for the next Critical Patch Update. Beginning with the July 2007 Critical Patch Update, we will create patches for historically inactive platform/version combinations of the Oracle Database and Oracle Application Server only if requested by customers. Fixes for the vulnerabilities will continue to be included in future releases and patch sets.

Additional details regarding the products, versions and platforms that will be supported for the next Critical Patch Update and the process for requesting On Request patches are available in Section 3.8 (Planned Patches for Next CPU release) of the Critical Patch Update Availability Information for Oracle Server and Middleware Products ( MetaLink Note 420061.1).

Credits

The following people or organizations discovered and brought security vulnerabilities addressed by this Critical Patch Update to Oracle's attention: Vicente Aguilera Diaz of Internet Security Auditors, S.L.; Gerhard Eschelbeck of Qualys, Inc.; Esteban Martinez Fayo of Application Security, Inc.; Joxean Koret; Alexander Kornbrust of Red Database Security GmbH; David Litchfield and Paul M. Wright of Next Generation Security Software Ltd.; noderat ratty; and TippingPoint's Zero Day Initiative.

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 15th day of January, April, July and October. The next four dates are:

  • 17 July 2007
  • 16 October 2007
  • 15 January 2008
  • 15 April 2008

References

Modification History


2007-APR-18
  • The Oracle Database risk matrix has been updated to correct the patch sets listed in the Last Affected DB Patch set column as follows:
    • For DB03, patch set 9.2.0.7 has been added.
    • For DB10, patch set 10.2.0.1 has been replaced with 10.1.0.5.
  • Oracle Enterprise Manager 9i, version 9.0.1.5 and Oracle9i Database Release 1, version 9.0.1.5 have been removed from the Supported Products and Components Affected section, as they are not supported. The Oracle Database risk matrix has been updated to refer to Oracle9i Database Release 1, version 9.0.1.5 FIPS+ rather than Oracle9i Database Release 1, version 9.0.1.5, and 9.0.1.5+ has been added to DB12.
2007-APR-17 Initial release



Appendix A - Oracle Database

Oracle Database Executive Summary

This Critical Patch Update contains a total of 14 new fixes for Oracle Database products, divided as follows:

  • 13 new security fixes for the Oracle Database. Additionally, 1 new security fix for Oracle Enterprise Manager, 1 new security fix for Oracle Workflow Cartridge, and 1 new security fix for the Ultra Search component (see Secure Enterprise Search, below) affect code bundled with the Oracle Database. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. Of the 2, DB01 only affects Microsoft Windows platforms, and EM01 only affects Oracle Enterprise Manager functionality that is included in the Oracle9i Database. 2 new fixes are applicable to Oracle Database client-only installations, i.e. installations that do not have the Oracle Database installed.
  • 1 new security fix for Oracle Secure Enterprise Search, which is a separate product that is not installed with the Oracle Database. The Oracle Database Ultra Search component contains code also present in the Oracle Secure Enterprise Search product, and both are potentially vulnerable.
  • No new security fixes for Oracle HTTP Server. Oracle recommends applying this Critical Patch Update to Oracle HTTP Server installations which are affected by vulnerabilities fixed in prior Critical Patch Updates if the prior patches have not been applied. Oracle HTTP Server is an optional product that is not installed by default with the Oracle Database. If it has not been installed, this software will not be present and the Oracle HTTP Server patches are not required. Oracle Database versions up to and including Oracle Database 9i Release 2 allowed Oracle HTTP Server to be installed as an optional component of the database. Oracle Database versions 10g Release 1 and higher include Oracle HTTP Server on the Companion CD.
  • No new security fixes for Oracle Application Express (formerly called HTML DB), but versions up to and including version 2.0 should be upgraded to the latest version. Oracle Application Express is an optional product that is not installed with the Oracle Database. If it has not been installed (it is provided on the Companion CD in the Oracle Database CD set for some Oracle Database versions), this software will not be present and the patches are not required. Please refer to Appendix A in the October 2006 Critical Patch Update advisory for more information.

Oracle Database Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
DB01 Core RDBMS Network None Yes 7.0 Remote Low Not Required Partial+ Partial+ Partial+ 9i 9.0.1.5+*, 9.2.0.8*, 10.1.0.5*, 10.2.0.2*
DB02 Rules Manager, Expression Filter Oracle Net Create session, alter package, create table and create type No 3.4 Remote High Required Partial+ Partial+ Partial+ 10gR2 10.2.0.3
DB03 Core RDBMS Local None No 2.9 Local Low Required Partial+ Partial+ Partial+ 9i 9.0.1.5+*, 9.2.0.7*, 10.1.0.4*
DB04 Advanced Queuing Oracle Net Execute on SYS.DBMS_ADMAQ_SYS No 2.8 Remote Low Required Partial Partial None 9i 9.0.1.5+, 9.2.0.7, 10.1.0.5
DB05 Authentication Oracle Net Create session No 2.8 Remote Low Required Partial Partial None 10g 10.1.0.5, 10.2.0.3
DB06 Oracle Streams Oracle Net Execute on SYS.DBMS_APPLY_USER_AGENT No 2.8 Remote Low Required Partial Partial None 10gR2 10.2.0.3
DB07 Upgrade/Downgrade Oracle Net Execute on SYS.DBMS_UPGRADE_INTERNAL No 2.8 Remote Low Required Partial Partial None 10g 10.1.0.5
EM01 Oracle Agent Network None Yes 2.3 Remote Low Not Required None None Partial 9iR2 9.2.0.8
DB08 Change Data Capture (CDC) Oracle Net Execute on DBMS_CDC_IPUBLISH No 1.4 Remote Low Required None None Partial+ 10g 10.1.0.5, 10.2.0.2
DB09 Change Data Capture (CDC) Oracle Net Execute on DBMS_CDC_PUBLISH No 1.4 Remote Low Required None None Partial+ 9iR2 9.2.0.7, 10.1.0.5, 10.2.0.2
OWF01 Oracle Workflow Cartridge HTTP Valid Session No 1.4 Remote Low Required None Partial None 9iR2 9.2.0.1, 10.1.0.2, 10.2.0.1
SES01 Ultra Search HTTP Access to Administration Web Interface No 1.4 Remote Low Required None Partial None 9i 9.2.0.8, 10.1.0.5, 10.2.0.2
DB10 Advanced Replication Oracle Net Execute on SYS.DBMS_SNAP_INTERNAL No 0.0 Remote Low Required None None None 9i 9.0.1.5+, 9.2.0.7, 10.1.0.5
DB11 Oracle Instant Client Local Ability to run genezi command No 0.0 Local Low Required None None None 10g 10.1.0.5, 10.2.0.2
DB12 Oracle Text Local Ability to run ctxsrv command No 0.0 Local Low Required None None None 9iR2 9.0.1.5+, 9.2.0.5
DB13 Upgrade/Downgrade Local Ability to run mig command No 0.0 Local Low Required None None None 9i 9.0.1.5+, 9.2.0.7

Notes:

  • DB01 and DB03 are specific to Microsoft Windows platforms. Other platforms are not vulnerable.
  • EM01 only affects Oracle Enterprise Manager functionality that is included in the Oracle9i Database.
  • SES01 is a vulnerability in the web interface to the Ultra Search component. It is potentially exploitable only if a web server, e.g. Oracle HTTP Server, has been installed and configured to make the web pages accessible.
  • Vulnerabilities with a CVSS base score of 0.0 represent problems that are not exploitable in a default database environment. DB10 is a vulnerability in a package that by default is only available to privileged users. DB11, DB12 and DB13 are vulnerabilities in command line utilities that do not run with privilege. If custom code runs affected programs as a privileged user, it may allow malicious code to be run as that user.
  • 9.0.1.5+ refers to Oracle Database 9i, version 9.0.1.5 FIPS+ which is only used in conjunction with Oracle Application Server 10g (9.0.4), version 9.0.4.3.

Oracle Database Client-only Installations

2 new database vulnerabilities addressed by this Critical Patch Update, DB11 and DB13, affect Oracle Database client-only installations (installations that do not have the Oracle Database installed). They are potentially exploitable where a privileged operating system process is passing input from an unprivileged source to the affected program. Oracle recommends applying this Critical Patch Update to client-only installations which may be using the affected programs in this way, or which are affected by client-only issues fixed in prior Critical Patch Updates if the prior patches have not been applied.

Client-side software in the middle tier is patched as part of the general middle tier patch and customers do not need to apply additional patches. Exceptions will be documented in the Patch Availability Document for Oracle Server and Middleware Products, or the Pre-Installation Note, depending on the product.


Oracle Secure Enterprise Search Risk Matrix



Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
SES01 Administration Front End HTTP Access to Administration Web Interface No 1.4 Remote Low Required None Partial None 10g 10.1.6

Upgrading Oracle Secure Enterprise Search

Oracle Secure Enterprise Search 10g is a standalone product that enables searching across a corporation's enterprise information assets. Unless you installed the Oracle Secure Enterprise Search product, it will not be present on your system and no further action is required. The security vulnerability listed in the risk matrix above is fixed in Oracle Secure Enterprise Search 10g Release 1, version 10.1.8. Customers on previous versions of Secure Enterprise Search should upgrade to version 10.1.8. Instructions on upgrading can be found in the Online Documentation. This and the software to install is referenced from the Oracle Technology Network Secure Enterprise Search page, on:
http://www.oracle.com/technology/software/products/search/index.html.



Appendix B - Oracle Application Server

Oracle Application Server Executive Summary

This Critical Patch Update contains 5 new security fixes for Oracle Application Server. 1 Oracle Workflow Cartridge fix and 1 Oracle Secure Enterprise Search fix also affect Oracle Application Server. 2 vulnerabilities may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. No new fixes are applicable to client-only installations, i.e. installations that do not have Oracle Application Server installed.

Oracle Application Server products that are bundled with the Oracle Database are affected by the vulnerabilities listed in the Oracle Database section. They are not discussed further in this section and are not listed in the Oracle Application Server risk matrix. Oracle Application Server 10g Release 2 (10.1.3.0.0) is not affected by Application Server specific vulnerabilities, but includes Oracle Database code that needs to be patched by applying the Oracle Application Server patch.

Oracle Application Server Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
AS01 Oracle Discoverer HTTP Valid Session No 4.2 Remote Low Required Partial+ Partial+ Partial+ 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.2.0
AS02 Oracle COREid Access HTTP Valid Session No 3.4 Remote Low Required Partial None Complete 7.0.4 7.0.4.4
AS03 Oracle Wireless HTTP Valid Session No 3.4 Remote High Required Partial Partial Partial 9.0.4.1 9.0.4.3
AS04 Oracle Portal HTTP None Yes 2.3 Remote Low Not Required None Partial None See below See below
AS05 Oracle Portal HTTP None Yes 1.9 Remote High Not Required Partial None None 10.1.4.0 10.1.4.1.0
SES01 Oracle Portal (Ultra Search) HTTP Access to Administration Web Interface No 1.4 Remote Low Required None Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.2.0
Oracle WebCenter Suite (Secure Enterprise Search) HTTP Access to Administration Web Interface No 1.4 Remote Low Required None Partial None 10g 10.1.6
OWF01 Oracle Workflow Cartridge HTTP Valid Session No 1.4 Remote Low Required None Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2

Notes:

  • The fix for AS04 is included in all supported products. Please refer to the Unsupported Products and De-Supported Versions section for more information on supported products. Customers on an unsupported version should upgrade to a supported version.

Oracle Application Server Client-only Installations

No new vulnerabilities addressed by this Critical Patch Update affect client-only installations of Application Server products. However, fixes for Oracle Containers for J2EE and Oracle Reports Developer which affect client-only installations were released in the October 2006 Critical Patch Update. Please refer to the October 2006 Critical Patch Update advisory for more information if these patches have not yet been applied.




Appendix C - Oracle Collaboration Suite

Oracle Collaboration Suite Executive Summary

There is 1 new Oracle Collaboration Suite specific fix in this Critical Patch Update. There is also 1 Oracle Workflow Cartridge fix that affects Oracle Collaboration Suite. Neither are remotely exploitable without authentication.

This Critical Patch Update contains no Oracle Application Server vulnerabilities that are in code included in Oracle Collaboration Suite.

Oracle Collaboration Suite bundles the Oracle Database. All the fixes listed in the Oracle Database part of the Oracle Database section are applicable. The Oracle Collaboration Suite documentation referenced from this advisory lists the patches that should be installed on Oracle Collaboration Suite instances to fix these Oracle Database issues.

Oracle Collaboration Suite Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
OCS01 Oracle Collaborative Workspace HTTP Valid Session No 1.4 Remote Low Required None Partial None 10.1.2 10.1.2
OWF01 Oracle Workflow Cartridge HTTP Valid Session No 1.4 Remote Low Required None Partial None 10.1.2 10.1.2



Appendix D - Oracle E-Business Suite and Applications

Oracle E-Business Suite and Applications Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle E-Business Suite. 2 of these vulnerabilities may be remotely exploited without authentication, i.e. they may be exploited over a network without the need for a username and password.

Oracle E-Business Suite includes Oracle9i Application Server Release 1, version 1.0.2.2 code, including Oracle Reports Developer. No Oracle Application Server vulnerabilities fixed in this Critical Patch Update affect this version.

Oracle E-Business Suite products include an Oracle Database which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle E-Business Suite risk matrix, but should be patched.

There are no new security fixes specific to Oracle Life Sciences Applications (previously known as Oracle Pharmaceutical Applications).

Oracle Life Sciences Applications includes Oracle Application Server components which should be patched. The exposure of Oracle Life Sciences Applications depends on the version of Oracle Application Server being used. Please refer to the Oracle Application Server section for more information.

Oracle Life Sciences Applications includes Oracle Database software which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Life Sciences Applications is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle Life Sciences Applications risk matrix, but should be patched.

Oracle Life Sciences Applications customers should refer to MetaLink Note 420639.1 for detailed information on installing Oracle Application Server and Oracle Database security patches.

Oracle E-Business Suite Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
APPS01 Oracle Common Applications HTTP Valid Session No 4.2 Remote Low Required Partial Partial Partial 11.5.7 11.5.10CU2
APPS02 Oracle iProcurement HTTP Self Service Web User Privilege Yes 2.3 Remote Low Not Required Partial None None 11.5.7 11.5.10CU2
APPS03 Oracle Report Manager HTTP None Yes 2.3 Remote Low Not Required Partial None None 11.5.8 12.0.0
APPS04 Oracle Application Object Library HTTP Any Valid Application User No 1.4 Remote Low Required Partial None None 11.5.10 12.0.0
APPS05 Oracle iStore HTTP iStore User No 1.4 Remote Low Required Partial None None 11.5.9 12.0.0
APPS06 Oracle iStore HTTP iStore User No 1.4 Remote Low Required Partial None None 11.5.9 12.0.0
APPS07 Oracle iSupport HTTP iSupport User No 1.4 Remote Low Required Partial None None 12.0.0 12.0.0
APPS08 Oracle Sales Online HTTP Sales User No 1.4 Remote Low Required Partial None None 11.5.9 11.5.10
APPS09 Oracle Trade Management HTTP Trade Management User No 1.4 Remote Low Required Partial None None 12.0.0 12.0.0
OWF01 Oracle Workflow Cartridge HTTP Valid Session No 1.4 Remote Low Required None Partial None 11.5.10 11.5.10CU2
APPS10 Oracle Applications Manager HTTP Patch Administrator No 1.0 Local Low Required Partial+ None None 11.5.7 12.0.0



Appendix E - Oracle Enterprise Manager

Oracle Enterprise Manager Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Enterprise Manager. It may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password.

Oracle Enterprise Manager 10g Grid Control includes Oracle Database and Oracle Application Server components which are affected by the vulnerabilities listed in the Oracle Database and Oracle Application Server sections. The Oracle Database and Oracle Application Server vulnerabilities that affect a particular instance of Oracle Enterprise Manager depend on the Oracle Database and Oracle Application Server versions in use. Refer to the risk matrices in the appropriate sections of this document for more information. The Critical Patch Update includes patches for Oracle Database and Oracle Application Server that can be installed to Oracle Enterprise Manager environments, and these patches should be installed.

Releases of Oracle Enterprise Manager before Oracle Enterprise Manager 10g Grid Control include Oracle Database components which are affected by the vulnerabilities listed in the Oracle Database section. The Oracle Database vulnerabilities that affect a particular instance of Oracle Enterprise Manager depend on the Oracle Database version in use. Refer to the risk matrices in the appropriate sections of this document for more information. The Critical Patch Update includes patches for Oracle Database that can be installed to Oracle Enterprise Manager environments, and these patches should be installed.

Oracle Enterprise Manager Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
EM01 Oracle Agent Network None Yes 2.3 Remote Low Not Required None None Partial 9i 9.2.0.8

Notes:

  • EM01 only affects Oracle Enterprise Manager functionality that is included in the Oracle9i Database.


Appendix F - Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne

Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle PeopleSoft Enterprise PeopleTools, 1 new security fix for PeopleSoft Enterprise Human Capital Management, and 1 new security fix for JD Edwards EnterpriseOne and JD Edwards OneWorld Tools. None of the underlying security vulnerabilities may be remotely exploitable without authentication, i.e. none may be exploited over a network without the need for a username and password.
There are no new security fixes for Oracle Enterprise Portal Solutions. The security patches released as part of the October 2006 Critical Patch Update should be applied if this has not been done. Please refer to Appendix F in the October 2006 Critical Patch Update advisory for more information.

Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see Customer Connection) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
PSE01 PeopleTools FTP File System Access No 2.4 Local High Required Partial Partial+ Partial 8.22 GA
8.47 GA
8.48 GA
8.22.14
8.47.12
8.48.08
PSE02 PeopleTools HTTP Valid Session No 1.4 Remote Low Required None Partial None 8.47GA
8.48 GA
8.47.12
8.48.08
PSEHCM01 PeopleSoft Enterprise Human Capital Management Network Valid Session No 1.0 Local Low Required Partial None None 8.9 8.9
JDE01 JD Edwards HTML Server HTTP Create session No 0.8 Local High Required Partial None None OneWorld Tools
&
EnterpriseOne Tools 8.96
SP23_Q1
&
8.96.I1