Oracle Critical Patch Update - October 2006


Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. This Critical Patch Update contains 101 new security fixes across all products.

Supported Products and Components Affected

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in [square brackets] following the product versions. Please click on the link in [square brackets] or in the Patch Availability Table to access the documentation for those patches.

Category I

Product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support policy; or Error Correction Support (ECS) or Extended Maintenance Support (EMS), under the previous support policy:

Oracle Database 10g Release 2, versions 10.2.0.1, 10.2.0.2 [ Database ]
Oracle Database 10g Release 1, versions 10.1.0.4, 10.1.0.5 [ Database ]
Oracle9i Database Release 2, versions 9.2.0.6, 9.2.0.7, 9.2.0.8 [ Database ]
Oracle8i Database Release 3, version 8.1.7.4 [ Database ]
Oracle Application Express (formerly called HTML DB), versions 1.5 - 2.0 [ Application Express Download Page (OTN) ]
Oracle Application Server 10g Release 3, version 10.1.3.0.0 [ Application Server ]
Oracle Application Server 10g Release 2, versions 10.1.2.0.0 - 10.1.2.0.2, 10.1.2.1.0 [ Application Server ]
Oracle Application Server 10g Release 1 (9.0.4), versions 9.0.4.2, 9.0.4.3 [ Application Server ]
Oracle Collaboration Suite 10g Release 1, version 10.1.2.0 [ Collaboration Suite ]
Oracle9i Collaboration Suite Release 2, version 9.0.4.2 [ Collaboration Suite ]
Oracle E-Business Suite Release 11i, versions 11.5.7 - 11.5.10 CU2 [ E-Business Suite ]
Oracle E-Business Suite Release 11.0 [ E-Business Suite ]
Oracle Pharmaceutical Applications versions 4.5.0 - 4.5.1 [ Pharmaceutical Applications ]
Oracle PeopleSoft Enterprise PeopleTools versions 8.22, 8.46, 8.47, 8.48 [ PeopleSoft/JDE ]
Oracle PeopleSoft Enterprise Portal Solutions, Enterprise Portal, versions 8.8, 8.9 [ PeopleSoft/JDE ]
JD Edwards EnterpriseOne Tools versions 8.95, 8.96 [ PeopleSoft/JDE ]
JD Edwards OneWorld Tools SP23 [ PeopleSoft/JDE ]

Category II

Products and components that are bundled with the products listed in Category I:

Oracle Developer Suite, versions 6i, 9.0.4.3, 10.1.2.0.2 [ E-Business Suite ] and [ Developer Suite ]

Category III

Products that are de-supported as a standalone installation but are supported when installed with the products listed in Category I:

Oracle9i Database Release 1, version 9.0.1.4 [ Collaboration Suite ]
Oracle9i Database Release 1, versions 9.0.1.5, 9.0.1.5 FIPS [ Application Server ]
Oracle9i Application Server Release 2, versions 9.0.2.3, 9.0.3.1 [ Collaboration Suite ]
Oracle9i Application Server Release 1, version 1.0.2.2 [ E-Business Suite ]

Patches for Category III products are only available when these products are installed as part of Category I products, and are tested solely on supported configurations and environments. Please refer to the documentation for each product for specific details concerning the support and availability of patches.

Category IV

Products that are supported only on selected platforms. Please consult the additional documentation for details.

Oracle Database 10g Release 1, version 10.1.0.3 [ Database ]
Oracle9i Database Release 2, version 9.2.0.5 [ Database ]
Oracle Application Server 10g Release 1 (9.0.4), version 9.0.4.1 [ Application Server ]

New for the October 2006 Critical Patch Update

The following improvements have been made to the advisory format:

  • The risk matrices now use the Common Vulnerability Scoring System (CVSS) to summarize vulnerabilities. Oracle continues to provide additional information consistent with that in risk matrices for previous Critical Patch Updates. More information about the new risk matrix columns and Oracle's implementation of the CVSS standard can be found in the References section.
  • Each product suite contains a brief executive summary of the number and type of vulnerabilities newly fixed in this Critical Patch Update.
  • Client applicability information, listing patches that need to be applied to machines other than servers, is now listed per product suite.

Patch Availability Table and Risk Matrices

The Oracle Database, Oracle Application Server, Oracle Enterprise Manager Grid Control, Oracle Collaboration Suite, JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications and PeopleSoft Enterprise PeopleTools patches in the Updates are cumulative; each Critical Patch Update contains the fixes from the previous Critical Patch Updates.

Oracle E-Business Suite and Applications patches are not cumulative, so E-Business Suite and Applications customers should refer to previous Critical Patch Updates to identify previous fixes they want to apply.

For each Oracle product being administered, please consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update October 2006 Documentation Map, MetaLink Note 391560.1.

Product Risk Matrix Pointer to More Information
Oracle Database Appendix A - Oracle Database Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 391563.1
Oracle Application Server Appendix B - Oracle Application Server Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 391563.1
Oracle Collaboration Suite Appendix C - Oracle Collaboration Suite Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 391563.1
Oracle E-Business Suite and Applications Appendix D - Oracle E-Business Suite and Applications Risk Matrix E-Business Suite Critical Patch Update Note, MetaLink Note 391564.1
Oracle Pharmaceutical Applications Appendix D - Oracle E-Business Suite and Applications Risk Matrix Oracle Pharmaceutical Applications Critical Patch Update October 2006, MetaLink Note 389994.1
Oracle Enterprise Manager Appendix E - Enterprise Manager Risk Matrix Critical Patch Update Availability for Oracle Server and Middleware Products, MetaLink Note 391563.1
Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Appendix F - Oracle PeopleSoft and JD Edwards Applications Risk Matrix Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Advisories

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous fixes can be found in previous Critical Patch Update advisories.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. The same vulnerability appears with the same Vuln # in all risk matrices. Italics indicate vulnerabilities in code included from other product areas.

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU) or a Security Alert. Results of the security analysis are reflected in the associated documentation describing, for example, the type of vulnerability, the conditions required to exploit it and the result of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit. Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the CPU or Security Alert notification, the Patch Availability Matrix, the readme files, and FAQs. Oracle does not provide advance notification on CPU or Security Alerts to individual customers. Finally, Oracle does not distribute exploit code nor “proof-of-concept” code for vulnerabilities in our products.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that fixes are applied as soon as possible. Depending on your environment, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from untrusted users may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends changes are tested on non-production systems. Neither approach should be considered a long term solution as neither corrects the underlying problem.

Unsupported Products and De-Supported Versions

Unsupported products, releases and versions are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier patch sets of affected releases are also affected by these vulnerabilities.

Supported products are patched in accordance with the Critical Patch Update policy summarized in the CPU Frequently Asked Questions document linked from the References section.

Critical Patch Update patches are available for customers who have purchased Extended Maintenance Support (EMS) before the implementation of the Lifetime Support Policy. De-support Notices indicate whether EMS is available for a particular release and platform, as well as the specific period during which EMS will be available.

Customers with valid licenses for product versions covered by Extended Support (ES), before the implementation of the Lifetime Support Policy, are entitled to download existing fixes; but new issues that may arise from the application of patches are not covered under ES. Therefore, ES customers should have comprehensive plans to enable removal of any applied patch.

Critical Patch Update patches are not provided for product versions which are no longer covered under the Extended Maintenance Support plan or the Lifetime Support Policy. We recommend that customers upgrade to the latest supported version of Oracle products in order to obtain patches.

Please review the "Extended Support" section within the Technical Support Policies for further guidelines regarding ES and EMS.

Credits

The following people discovered and brought security vulnerabilities addressed by this Critical Patch Update to Oracle's attention: Johannes Fahrenkrug; Sacha Faust of S.P.I. Dynamics, Inc.; Esteban Martinez Fayo of Application Security, Inc.; Jeff Kayser of Database Doctor, Inc.; Alexander Kornbrust of Red Database Security GmbH; David Litchfield of Next Generation Security Software Ltd.; and Andrew Maksimenko of COMEC-92.

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 15th day of January, April, July and October. The next four dates are:

  • 16 January 2007
  • 17 April 2007
  • 17 July 2007
  • 16 October 2007

References

Modification History


2006-OCT-17 Initial release
2006-OCT-31 Jeff Kayser of Database Doctor, Inc., has been added to the credit section.
The Oracle Database risk matrix has been updated to indicate the vulnerabilities that affect Oracle Database version 9.2.0.8.
The Oracle Database risk matrix has been updated to remove version 10.2.0.0 from DB10 Last Affected Patch set column. The fix is included in the first production release of Oracle Database 10g Release 2, version 10.2.0.1. Version 10.2.0.0 was a beta version and should not have been listed.
Non-existent and non-supported versions of Oracle Developer Suite listed in the Category II section have been removed.
The CVSS base score for PSE03 has been corrected from 4.2 to 2.8, and the vulnerabilities re-ordered.
2006-NOV-20 Added Oracle Database 9.2.0.8 to the Category I section of affected products section so it is consistent with the Oracle Database risk matrix.
2007-MAR-06 Changed privilege required for DB02

Appendix A - Oracle Database

Oracle Database Executive Summary

This Critical Patch Update contains a total of 63 new security fixes for Oracle Database products, divided as follows:

  • 22 new security fixes for the Oracle Database, all of which require a valid database username and password.
  • 6 new security fixes for Oracle HTTP Server, 5 of which may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. Oracle HTTP Server is an optional product that is not installed by default with the Oracle Database. If it has not been installed, this software will not be present and the Oracle HTTP Server patches are not required. Oracle Database versions up to and including Oracle Database 9i Release 2 allowed Oracle HTTP Server to be installed as an optional component of the database. Oracle Database versions 10g Release 1 and higher include Oracle HTTP Server on the Companion CD.
  • 35 new security fixes for Oracle Application Express, 25 of which may be remotely exploitable without authentication. Oracle Application Express is an optional product that is not installed with the Oracle Database. If it has not been installed (it is provided on the Companion CD in the Oracle Database CD set for some Oracle Database versions), this software will not be present and the patches are not required.

No new fixes are applicable to Oracle Database client-only installations, i.e. installations that do not have the Oracle Database installed.


Oracle Database Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
DB01 XMLDB Oracle Net Execute on xdb.dbms_xdbz No 4.2 Remote Low Required Partial+ Partial+ Partial 9iR2 9.2.0.6, 10.1.0.4
DB02 Oracle Spatial Oracle Net Create session No 3.4 Remote High Required Partial Partial+ Partial+ 10gR2 10.2.0.2
DB03 Oracle Spatial Oracle Net Execute on mdsys.md2 No 3.4 Remote High Required Partial+ Partial+ Partial+ 9i 9.0.1.5, 9.2.0.7, 10.1.0.5
DB04 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_impdp No 2.8 Remote Low Required Partial+ Partial+ None 10g 10.1.0.5, 10.2.0.2
DB05 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_ipublish No 2.8 Remote Low Required Partial Partial None 9iR2 9.2.0.7, 10.1.0.5, 10.2.0.2
DB06 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_isubscribe No 2.8 Remote Low Required Partial+ Partial+ None 9iR2 9.2.0.7, 10.1.0.5, 10.2.0.2
DB07 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_isubscribe No 2.8 Remote Low Required Partial+ Partial+ None 10g 10.1.0.5, 10.2.0.2
DB08 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_isubscribe No 2.8 Remote Low Required Partial+ Partial+ None 10g 10.1.0.5, 10.2.0.2
DB09 Core RDBMS Oracle Net Create session No 2.8 Remote Low Required None Partial+ Partial+ 9i 9.0.1.5, 9.2.0.8, 10.1.0.5, 10.2.0.2
DB10 Core RDBMS Oracle Net Execute on sys.dbms_sqltune No 2.8 Remote Low Required Partial Partial None 10g 10.1.0.5
DB11 Oracle Spatial Oracle Net Execute on mdsys.sdo_geom No 2.8 Remote Low Required None Partial Partial+ 8i 8.1.7.4, 9.0.1.5, 9.2.0.7, 10.1.0.4
DB12 Oracle Spatial Oracle Net Execute on mdsys.sdo_geor_int No 2.8 Remote Low Required Partial+ Partial+ None 10g 10.1.0.5, 10.2.0.2
DB13 Oracle Spatial Oracle Net Execute on mdsys.sdo_lrs No 2.8 Remote Low Required Partial Partial None 8i 8.1.7.4, 9.0.1.5, 9.2.0.8, 10.1.0.5, 10.2.0.2
DB14 XMLDB Oracle Net Create session No 2.8 Remote Low Required Partial+ Partial+ None 9iR2 9.2.0.8, 10.1.0.5, 10.2.0.2
DB15 XMLDB Oracle Net Execute on xdb.dbms_xdbz No 2.8 Remote Low Required Partial Partial None 9iR2 9.2.0.8, 10.1.0.5, 10.2.0.2
DB16 Change Data Capture (CDC) Oracle Net Execute on sys.dbms_cdc_isubscribe No 2.2 Remote High Required Partial+ Partial+ None 10g 10.1.0.5, 10.2.0.2
DB17 Oracle Spatial Oracle Net Create session No 2.2 Remote High Required Partial+ Partial+ None 8i 8.1.7.4, 9.0.1.5, 9.2.0.8, 10.1.0.5, 10.2.0.2
DB18 Oracle Spatial Oracle Net Execute on mdsys.sdo_tune No 2.2 Remote High Required None Partial Partial+ 9i 9.0.1.5, 9.2.0.6, 10.1.0.3
DB19 Database Scheduler Oracle Net Execute on sys.dbms_scheduler No 1.4 Remote Low Required Partial None None 10g 10.1.0.3
DB20 Oracle Spatial Oracle Net Execute on mdsys.sdo_3gl No 1.4 Remote Low Required None None Partial 8i 8.1.7.4, 9.0.1.5, 9.2.0.7, 10.1.0.4
DB21 Oracle Spatial Oracle Net Execute on mdsys.sdo_cs No 1.4 Remote Low Required None None Partial 8i 8.1.7.4, 9.0.1.5, 9.2.0.7, 10.1.0.4
DB22 Oracle Spatial Oracle Net Execute on mdsys.sdo_geom No 1.4 Remote Low Required None None Partial 9i 9.0.1.5, 9.2.0.7, 10.1.0.4

Oracle Database Client-only Installations

The new database vulnerabilities addressed by this Critical Patch Update do not affect Oracle Database Client-only installations (installations that do not have the Oracle Database installed). Therefore, it is not necessary to apply this Critical Patch Update to client-only installations if a prior Critical Patch Update, or Alert 68, has already been applied to the client-only installations.

Client-side software in the middle tier is patched as part of the general middle tier patch and customers do not need to apply additional patches. Exceptions will be documented in the Patch Availability Document or Pre-Installation Note, depending on the product.

Oracle HTTP Server Risk Matrix


Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
OHS02 Oracle HTTP Server Local or HTTP Ability to run htdigest program Yes 3.7 Remote High Not Required None Partial Partial 9i 9.2.0.7
OHS04 Oracle HTTP Server HTTPS Secure Socket Layer Yes 2.3 Remote Low Not Required None Partial None 9i 9.2.0.7
OHS05 Oracle HTTP Server HTTPS Secure Socket Layer Yes 2.3 Remote Low Not Required Partial None None 9i 9.2.0.7
OHS06 Oracle HTTP Server HTTP None Yes 2.3 Remote Low Not Required None Partial None 9i 9.2.0.7, 10.1.0.5
OHS07 * Oracle HTTP Server HTTPS Secure Socket Layer Yes 1.9 Remote High Not Required None None Partial 9i 9.2.0.7
OHS08 Oracle HTTP Server Local Secure Socket Layer No 0.8 Local High Required Partial+ None None 9i 9.2.0.7

Notes:

  • OHS07 is only applicable to the HP Tru64 UNIX platform. Other supported platforms are not vulnerable. Supported versions of Oracle Application Server are not vulnerable.

Oracle Application Express (Formerly Called Oracle HTML DB) Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
APEX01 Application Express HTTP None Yes 7.0 Remote Low Not Required Partial Partial Partial 1.5 2.0
APEX02 Application Express HTTP None Yes 5.6 Remote High Not Required Partial+ Partial+ Partial+ 1.5 2.0
APEX03 Application Express HTTP None Yes 5.6 Remote High Not Required Partial Partial Partial 1.5 2.0
APEX04 Application Express HTTP None Yes 5.6 Remote High Not Required Partial Partial Partial 1.5 1.6.1
APEX05 Application Express HTTP None Yes 4.7 Remote Low Not Required Partial Partial None 1.5 2.0
APEX06 Application Express HTTP None Yes 4.7 Remote Low Not Required None Partial Partial 1.5 2.0
APEX07 Application Express HTTP None Yes 4.7 Remote Low Not Required None Partial+ Partial+ 1.5 2.0
APEX08 Application Express HTTP None Yes 4.7 Remote Low Not Required Partial+ Partial+ None 1.5 2.0
APEX09 Application Express HTTP None Yes 4.7 Remote Low Not Required None Partial Partial 1.5 2.0
APEX10 Application Express HTTP Database user with execute on htmldb_plsql_job No 4.2 Remote Low Required Partial+ Partial+ Partial+ 1.5 2.0
APEX11 Application Express HTTP Database user with create any synonym No 4.2 Remote Low Required Partial+ Partial+ Partial+ 1.5 2.0
APEX12 Application Express HTTP None Yes 3.7 Remote High Not Required Partial Partial None 1.5 2.0
APEX13 Application Express HTTP None Yes 3.7 Remote High Not Required None Partial Partial 1.5 2.0
APEX14 Application Express HTTP None Yes 3.7 Remote High Not Required Partial Partial None 1.5 2.0
APEX15 Application Express HTTP APEX developer user with execute on SQL Workshop No 3.4 Remote High Required Partial+ Partial+ Partial+ 1.5 2.0
APEX16 Application Express HTTP APEX developer user with execute on SQL Workshop No 3.4 Remote High Required Partial+ Partial+ Partial+ 1.5 2.0
APEX17 Application Express HTTP None Yes 3.3 Remote Low Not Required None None Complete 1.5 2.0
APEX18 Application Express HTTP None No 2.8 Remote Low Required Partial+ Partial+ None 1.5 2.0
APEX19 Application Express HTTP None No 2.8 Remote Low Required Partial+ Partial+ None 1.5 2.0
APEX20 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 1.6.1
APEX21 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 1.6.1
APEX22 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 2.0
APEX23 Application Express HTTP None Yes 2.3 Remote Low Not Required None None Partial+ 1.5 2.0
APEX24 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 2.0
APEX25 Application Express HTTP None Yes 2.3 Remote Low Not Required None None Partial 1.5 2.0
APEX26 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 2.0
APEX27 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 2.0
APEX28 Application Express HTTP None Yes 2.3 Remote Low Not Required None Partial None 1.5 2.0
APEX29 Application Express HTTP None No 2.2 Remote High Required Partial Partial None 1.5 2.0
APEX30 Application Express HTTP None No 2.2 Remote High Required Partial Partial None 1.5 2.0
APEX31 Application Express HTTP None Yes 1.9 Remote High Not Required None Partial None 1.5 2.0
APEX32 Application Express HTTP None Yes 1.9 Remote High Not Required Partial None None 1.5 2.0
APEX33 Application Express HTTP None Yes 1.9 Remote High Not Required None None Partial 1.5 2.0
APEX34 Application Express HTTP None No 1.4 Remote Low Required None Partial None 1.5 2.0
APEX35 Application Express HTTP None No 1.1 Remote High Required Partial None None 1.5 2.0

Overview of Oracle Application Express (Formerly Called Oracle HTML DB)

Oracle Application Express (formerly called Oracle HTML DB), is a rapid web application development tool for the Oracle Database. Unless you separately installed Oracle Application Express from a Companion CD supplied with the Oracle Database CD set or from a packaged downloaded from an Oracle web site, it will not be present on your system and no further action is required.

The Companion CD to Database 10g Release 1 shipped with HTML DB (currently labeled as Application Express) version 1.5.
The Companion CD to Database 10g Release 2 shipped with HTML DB (currently labeled as Application Express) version 1.6.1.

To check for the presence of Application Express on a system, run the following command from a SQL prompt as SYS:
select username from dba_users where username in ('FLOWS_010500','FLOWS_010600','FLOWS_020000','FLOWS_020200');

If the result is 'no rows selected' then no version of the product is installed and no further action is required. Other output indicates Oracle Application Express is installed and should be upgraded, even if it is not actively in use.

Upgrading Oracle Application Express

The Oracle Application Express security vulnerabilities listed in the risk matrix above are fixed in version 2.2.1. All previous versions should be upgraded directly to version 2.2.1. Instructions on upgrading and the software to install Oracle Application Express version 2.2.1 can be found on:
http://www.oracle.com/technology/products/database/application_express/download.html


Appendix B - Oracle Application Server

Oracle Application Server Executive Summary

This Critical Patch Update contains 14 new security fixes for the Oracle Application Server, 13 of which may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. 3 of the new fixes are applicable to client-only installations of Oracle Reports Developer and Oracle Containers for J2EE. Patches for this Critical Patch Update should be applied to all machines that have these products installed.

This Critical Patch Update also contains 6 new security fixes for Oracle Application Server products that are not supported for standalone use, but are supported for use as part of supported products, i.e. those listed in the Category I section. All 6 may be remotely exploitable without authentication. More details of these fixes can be found in the sections of this document covering: Oracle Database, Oracle Collaboration Suite and Oracle E-Business Suite. They are not discussed further in this section, as they do not apply to Oracle Application Server standalone instances.

Oracle Application Server products that are bundled with the Oracle Database are affected by the vulnerabilities listed in the Oracle Database section. They are not discussed further in this section and are not listed in the Oracle Application Server risk matrix.

Oracle Application Server Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
OHS01 Oracle HTTP Server HTTP Mod_rewrite Module Yes 4.7 Remote Low Not Required None Partial Partial 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.1.0, 10.1.3.0.0
SSO01 Oracle Single Sign-On HTTP Valid Session Yes 3.7 Remote High Not Required Partial Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.1.0
OHS03 Oracle HTTP Server HTTP PHP Module Yes 3.3 Remote Low Not Required None None Complete 10.1.2.0 10.1.2.0.1, 10.1.2.0.2, 10.1.2.1.0
FORM01 Oracle Forms HTTP None Yes 2.3 Remote Low Not Required Partial None None 9.0.4.1 9.0.4.3, 10.1.2.0.2 (10.1.2.0.0 is not affected)
FORM02 Oracle Forms HTTP None Yes 2.3 Remote Low Not Required None None Partial 9.0.4.1 9.0.4.3, 10.1.2.0.2 (10.1.2.0.0 is not affected)
OC4J02 Oracle Containers for J2EE HTTP None Yes 2.3 Remote Low Not Required None None Partial+ 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.1.0
OHS06 Oracle HTTP Server HTTP None Yes 2.3 Remote Low Not Required None Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2, 10.1.2.1.0, 10.1.3.0
REP01 Oracle Reports Developer HTTP None Yes 2.3 Remote Low Not Required None Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2
REP02 Oracle Reports Developer HTTP None Yes 2.3 Remote Low Not Required None Partial None 9.0.4.1 9.0.4.3, 10.1.2.0.2
FORM03 Oracle Forms HTTP None Yes 1.9 Remote High Not Required Partial None None 9.0.4.1 9.0.4.2
OC4J03 Oracle Containers for J2EE Oracle Remote Method Invocation None Yes 1.9 Remote High Not Required None None Partial 9.0.4.1 9.0.4.3, 10.1.2.0.0, 10.1.2.0.1
OC4J04 Oracle Containers for J2EE HTTP Web Services Security Yes 1.9 Remote High Not Required Partial None None 10.1.3 10.1.3.0.0
SSO02 Oracle Single Sign-On HTTP None Yes 1.9 Remote High Not Required Partial None None 10.1.2.0 10.1.2.0.1
OC4J05 Oracle Containers for J2EE HTTP Custom Login Module No 1.1 Remote High Required Partial None None 9.0.4.1 9.0.4.1, 10.1.2.0.2

Notes:

  • OC4J01, OHS02, OHS04, OHS05, OHS08 and OPMN01 are only applicable to Oracle Collaboration Suite and/or Oracle E-Business Suite products. Supported versions of Oracle Application Server are not affected by these vulnerabilities, so they are not listed in the risk matrix above.
  • OHS07 is only applicable to Oracle HTTP Server as supplied with the Oracle Database. Supported versions of Oracle Application Server are not vulnerable to this issue. This vulnerability is only listed in the Oracle Database section.

Oracle Application Server Client-only Installations

Two new vulnerabilities addressed by this Critical Patch Update affect Oracle Containers for J2EE client-only installations. They are identified as OC4J02 and OC4J04 in the risk matrix above. All machines that have components of Oracle Containers for J2EE installed should have the Critical Patch Update applied.

One new vulnerability addressed by this Critical Patch Update affects Oracle Reports Developer client-only installations. It is identified as REP01 in the risk matrix above. All machines that have components of Oracle Reports installed should have the Critical Patch Update applied.


Appendix C - Oracle Collaboration Suite

Oracle Collaboration Suite Executive Summary

There are no new Oracle Collaboration Suite specific fixes in this Critical Patch Update. Please refer to the July 2006 Critical Patch Update for the latest Oracle Collaboration Suite specific fixes.

This Critical Patch Update contains 12 Oracle Application Server vulnerabilities that are in code included in Oracle Collaboration Suite. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. The application tier stack patch supplied as part of this Critical Patch Update contains these fixes and should be installed on Oracle Collaboration Suite instances.

Oracle Collaboration Suite bundles the Oracle Database. All the fixes listed in the Oracle Database part of the Oracle Database section are applicable. The Oracle Collaboration Suite documentation referenced from this advisory lists the patches that should be installed on Oracle Collaboration Suite instances to fix these Oracle Database issues.

Oracle Collaboration Suite Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
OHS01 Oracle HTTP Server HTTP Mod_rewrite Module Yes 4.7 Remote Low Not Required None Partial Partial 9.0.4 9.0.4.2, 10.1.2
OHS02 Oracle HTTP Server Local or HTTP Ability to run htdigest program Yes 3.7 Remote High Not Required None Partial Partial 9.0.4 9.0.4.2
SSO01 Oracle Single Sign-On HTTP Valid Session Yes 3.7 Remote High Not Required Partial Partial None 9.0.4 9.0.4.2, 10.1.2
OC4J01 Oracle Containers for J2EE HTTP None Yes 2.3 Remote Low Not Required None Partial None 9.0.4 9.0.4.2
OC4J02 Oracle Containers for J2EE HTTP None Yes 2.3 Remote Low Not Required None None Partial+ 9.0.4 9.0.4.2, 10.1.2
OHS04 Oracle HTTP Server HTTPS Secure Socket Layer Yes 2.3 Remote Low Not Required None Partial None 9.0.4 9.0.4.2
OHS05 Oracle HTTP Server HTTPS Secure Socket Layer Yes 2.3 Remote Low Not Required Partial None None 9.0.4 9.0.4.2
OHS06 Oracle HTTP Server HTTP None Yes 2.3 Remote Low Not Required None Partial None 9.0.4 9.0.4.2, 10.1.2
OPMN01 Oracle Process Mgmt & Notification ONS None Yes 2.3 Remote Low Not Required None None Partial+ 9.0.4 9.0.4.2
OC4J03 Oracle Containers for J2EE Oracle Remote Method Invocation None Yes 1.9 Remote High Not Required None None Partial 9.0.4 9.0.4.2, 10.1.2
SSO02 Oracle Single Sign-On HTTP None Yes 1.9 Remote High Not Required Partial None None 10.1.2 10.1.2
OC4J05 Oracle Containers for J2EE HTTP Custom Login Module No 1.1 Remote High Required Partial None None 10.1.2 10.1.2

Appendix D - Oracle E-Business Suite and Applications

Oracle E-Business Suite and Applications Executive Summary

This Critical Patch Update contains 13 new security fixes for the Oracle E-Business Suite. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password.

Oracle E-Business Suite includes Oracle9i Application Server Release 1, version 1.0.2.2 code. 8 of the Oracle Application Server vulnerabilities are applicable to this version of the code, and 7 may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. The application tier stack patch supplied as part of this Critical Patch Update contains these fixes and should be installed on Oracle E-Business Suite instances.

Oracle E-Business Suite products include an Oracle Database which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle E-Business Suite risk matrix, but should be patched.

This Critical Patch Update contains 1 new security fix for Oracle Pharmaceutical Applications. A valid username and password is required to attempt to exploit it. Oracle Pharmaceutical Applications include Oracle Application Server components which should be patched. The exposure of Oracle Pharmaceutical Applications depends on the version of Oracle Application Server being used. The E-Business Suite risk matrix includes Oracle Application Server vulnerabilities applicable to Oracle9i Application Server Release 1, version 1.0.2.2, and the Oracle Application Server section lists vulnerabilities applicable to other versions.

Oracle Pharmaceutical Applications include an Oracle Database which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Pharmaceutical Applications is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle Pharmaceutical Applications risk matrix, but should be patched.

Oracle E-Business Suite Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
OHS02 Oracle HTTP Server Local or HTTP Ability to run htdigest program Yes 3.7 Remote High Not Required None Partial Partial 11.0 11.5.10CU2
SSO01 * Oracle Single Sign-On HTTP Valid Session Yes 3.7 Remote High Not Required Partial Partial None 11.5.7 11.5.10CU2
APPS01 Oracle Exchange HTTP None Yes 2.3 Remote Low Not Required None Partial None 6.2.4 6.2.4
FORM02 Oracle Forms HTTP None Yes 2.3 Remote Low Not Required None None Partial 11.5.7 11.5.10CU2
OHS05 Oracle HTTP Server HTTPS Secure Socket Layer Yes 2.3 Remote Low Not Required Partial None None 11.0 11.5.10CU2
OHS06 Oracle HTTP Server HTTP None Yes 2.3 Remote Low Not Required None Partial None 11.0 11.5.10CU2
REP01 Oracle Reports Developer HTTP None Yes 2.3 Remote Low Not Required None Partial None 11.5.7 11.5.10CU2
REP02 Oracle Reports Developer HTTP None Yes 2.3 Remote Low Not Required None Partial None 11.5.7 11.5.10CU2
APPS02 Oracle Application Object Library HTTP Any Responsibility No 1.4 Remote Low Required Partial None None 11.5.9 11.5.10CU2
APPS03 Oracle Applications Framework HTTP Any Responsibility No 1.4 Remote Low Required None Partial None 11.5.7 11.5.10CU2
APPS04 Oracle Applications Technology Stack HTTP None No 1.4 Remote Low Required None None Partial 11.5.7 11.5.10CU2
APPS05 Oracle Balanced Scorecard Forms or HTTP Balanced Scorecard Manager No 1.4 Remote Low Required Partial None None 11.5.7 11.5.10CU2
APPS06 * Oracle CRM Gateway for Mobile Devices Forms or HTTP Mobile Field Service Administrator No 1.4 Remote Low Required Partial None None 11.5.8 11.5.10CU2
APPS07 Oracle Email Center Forms or HTTP Email Center Administrator No 1.4 Remote Low Required Partial None None 11.5.7 11.5.9
APPS08 Oracle iStore HTTP None No 1.4 Remote Low Required None Partial None 11.5.8 11.5.10CU2
APPS09 Oracle Scripting Forms or HTTP Scripting Agent No 1.4 Remote Low Required Partial None None 11.5.7 11.5.10CU2
APPS10 Oracle Trading Community Forms or HTTP TCA Administrator No 1.4 Remote Low Required Partial None None 11.5.7 11.5.10CU2
APPS11 Oracle Universal Work Queue Forms or HTTP iMeeting System Configure Responsibility No 1.4 Remote Low Required Partial None None 11.5.10 11.5.10CU2
APPS12 Oracle Application Object Library HTTP or Oracle Net Any Responsibility No 1.1 Remote High Required None Partial None 11.5.10 11.5.10CU2
APPS13 Oracle Install Base Forms or HTTP Oracle Install Base Administrator No 1.1 Remote High Required None Partial None 11.5.9 11.5.10CU1
OHS08 Oracle HTTP Server Local Secure Socket Layer No 0.8 Local High Required Partial+ None None 11.0 11.5.10CU2

Notes:

  • SSO01 is only applicable to E-Business Suite instances on which Oracle Application Server Single Sign-On has been installed.
  • APPS06 is only applicable to E-Business Suite instances with Mobile Field Sales installed.

Oracle Pharmaceutical Applications Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
PHAR01 Oracle Clinical Remote Data Capture Option HTTP Clinical User No 2.2 Remote High Required Partial Partial None 4.5.0 4.5.1

Appendix E - Oracle Enterprise Manager

Oracle Enterprise Manager Executive Summary

This Critical Patch Update contains no new Oracle Enterprise Manager fixes. Please refer to the July 2006 Critical Patch Update for the latest Oracle Enterprise Manager fixes.

Oracle Enterprise Manager includes Oracle Database and Oracle Application Server components which are affected by the vulnerabilities listed in the Oracle Database and Oracle Application Server sections. The Oracle Database and Oracle Application Server vulnerabilities that affect a particular instance of Oracle Enterprise Manager depend on the Oracle Database and Oracle Application Server versions in use. Refer to the risk matrices in the appropriate sections of this document for more information. The Critical Patch Update includes patches for Oracle Database and Oracle Application Server that can be installed to Oracle Enterprise Manager environments, and these patches should be installed.


Appendix F - Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne

Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle PeopleSoft Enterprise PeopleTools and Enterprise Portal Solutions, and 1 new security fix for JD Edwards EnterpriseOne. 1 Oracle PeopleSoft Enterprise PeopleTools vulnerability may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password. The JD Edwards EnterpriseOne vulnerability is not remotely exploitable without authentication.

Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Risk Matrix

Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS RISK (see 394486.1) Earliest Supported Release Affected Last Affected Patch set (per Supported Release)
Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability
PSE01 PeopleTools HTTP Valid Session No 6.0 Remote Low Required Complete Complete Complete 8.46 GA
8.47 GA
8.48 GA
8.46.15
8.47.09
8.48.03
PSE02 PeopleTools HTTP None Yes 4.7 Remote Low Not Required Partial Partial+ None 8.46 GA
8.47 GA
8.48 GA
8.46.15
8.47.09
8.48.03
PSE04 PeopleTools HTTP Valid Session No 3.4 Remote Low Required Complete None Partial 8.22 GA
8.46 GA
8.47 GA
8.48 GA
8.22.11
8.46.15
8.47.09
8.48.03
PSE03 PeopleTools HTTP Valid Session No 2.8 Remote Low Required Partial Partial None 8.46GA
8.47GA
8.48 GA
8.46.15
8.47.09
8.48.03
PSE05 PeopleSoft Enterprise Portal HTTP Valid Session No 2.8 Remote Low Required Partial Partial None 8.80 GA
8.90 GA
8.8 Bundle 11
8.9 Bundle 4
PSE06 PeopleTools HTTP Valid Session No 1.4 Remote Low Required Partial+ None None 8.22 GA
8.46 GA
8.47 GA
8.48 GA
8.22.11
8.46.15
8.47.09
8.48.03
PSE07 PeopleTools HTTP Valid Session No 1.1 Remote High Required Partial+ None None 8.22 GA
8.46 GA
8.47 GA
8.48 GA
8.22.11
8.46.15
8.47.09
8.48.03
PSE08 PeopleTools HTTP Valid Session No 1.1 Remote High Required Partial+ None None 8.22 GA
8.46 GA
8.47 GA
8.48 GA
8.22.11
8.46.15
8.47.09
8.48.03
JDE01 JD Edwards HTML Server HTTP Create session No 1.4 Remote Low Required Partial None None OneWorld Tools
&
EnterpriseOne Tools 8.95,
8.96
SP23_O2
&
8.95.P1
8.96.D1