Topics
Security
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. Critical Patch Updates are cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible. This Critical Patch Update contains 51 new security fixes across all products.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in [square brackets] following the product versions. Please click on the link in [square brackets] or in the Patch Availability Table to access the documentation for those patches.
Product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support policy:
| Oracle Database 10g Release 2, versions 10.2.0.2, 10.2.0.3 | [ Database ] |
| Oracle Database 10g, version 10.1.0.5 | [ Database ] |
| Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV | [ Database ] |
| Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.0.0, 10.1.3.1.0, 10.1.3.2.0, 10.1.3.3.0 | [ Application Server ] |
| Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.1 - 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0 | [ Application Server ] |
| Oracle Application Server 10g (9.0.4), version 9.0.4.3 | [ Application Server ] |
| Oracle Collaboration Suite 10g, version 10.1.2 | [ Collaboration Suite ] |
| Oracle E-Business Suite Release 12, versions 12.0.0 - 12.0.3 | [ E-Business Suite ] |
| Oracle E-Business Suite Release 11i, versions 11.5.8 - 11.5.10 CU2 | [ E-Business Suite ] |
| Oracle Enterprise Manager Database Control 10g Release 2, versions 10.2.0.2, 10.2.0.3 | [ Enterprise Manager ] |
| Oracle Enterprise Manager Database Control 10g Release 1, version 10.1.0.5 | [ Enterprise Manager ] |
| Oracle Enterprise Manager Grid Control 10g Release 1, versions 10.1.0.5, 10.1.0.6 | [ Enterprise Manager ] |
| Oracle PeopleSoft Enterprise PeopleTools versions 8.22, 8.47, 8.48, 8.49 | [ PeopleSoft/JDE ] |
| Oracle PeopleSoft Enterprise Human Capital Management versions 8.9, 9.0 (Absence Management Module) | [ PeopleSoft/JDE ] |
Products and components that are bundled with the products listed in Category I.
No products in this category are affected by the fixes included in this Critical Patch Update.
Products that are de-supported as a standalone installation but are supported when installed with the products listed in Category I:
| Oracle Database 9i, version 9.0.1.5 FIPS+ | [ Application Server ] |
| Oracle Application Server 9i Release 1, version 1.0.2.2 | [ E-Business Suite ] |
Patches for Category III products are only available when these products are installed as part of Category I products, and are tested solely on supported configurations and environments. Please refer to the documentation for each product for specific details concerning the support and availability of patches.
Products that are supported only on selected platforms. Please consult the additional documentation for details.
No products in this category are affected by the fixes included in this Critical Patch Update.
The Oracle Database, Oracle Application Server, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications (Release 12 only), JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications and PeopleSoft Enterprise PeopleTools patches in the Updates are cumulative; each Critical Patch Update contains the fixes from the previous Critical Patch Updates.
Oracle E-Business Suite Applications Release 11i patches are not cumulative, so Oracle E-Business Suite Applications customers should refer to previous Critical Patch Updates to identify previous security fixes they want to apply. Oracle Collaboration Suite patches were cumulative up to and including the fixes provided in the April 2007 Critical Patch Update. From the July 2007 Critical Patch Update on, Oracle Collaboration Suite security fixes are delivered using the one-off patch infrastructure normally used by Oracle to deliver single bug fixes to customers.
For each Oracle product being administered, please consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update October 2007 Documentation Map, MetaLink Note 455285.1.
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. The same vulnerability appears with the same Vuln # in all risk matrices. Italics indicate vulnerabilities in code included from other product areas.
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose information about the security analysis, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential result of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit. Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the CPU or Security Alert notification, the Patch Availability Matrix, the readme files, and FAQs. Oracle does not provide advance notification on CPU or Security Alerts to individual customers. Finally, Oracle distributes neither exploit code nor “proof-of-concept” code for product vulnerabilities.
Starting with this Critical Patch Update, security vulnerabilities are now scored using CVSS version 2.0 (see MetaLink Note 394487.1). Previous Critical Patch Updates were scored using CVSS version 1.0. To aid in the transition from CVSS version 1.0 to CVSS version 2.0 scoring, for this Critical Patch Update only, both scores are provided for comparison in MetaLink Note 458015.1.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible. Depending on your environment, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Unsupported products, releases and versions are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier patch sets of affected releases are also affected by these vulnerabilities.
Critical Patch Update patches are not provided for product versions that are no longer covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers upgrade to the latest supported version of Oracle products in order to obtain patches.
Extended Support Phase: Critical Patch Update patches are available to customers who have purchased Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to be able to download Critical Patch Update patches. Critical Patch Update patches may not be downloaded to update products supported with Sustaining Support, or to update any unsupported products.
Supported products are patched in accordance with the Critical Patch Update policy summarized in the CPU Frequently Asked Questions document linked from the References section. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
Oracle will proactively create patches only for platform/version combinations that, based on historical data, customers are likely to download for the next Critical Patch Update. We create patches for historically inactive platform/version combinations of the Oracle Database and Oracle Application Server only if requested by customers. Fixes for the vulnerabilities will continue to be included in future releases and patch sets.
Additional details regarding the products, versions and platforms that will be supported for the next Critical Patch Update and the process for requesting On Request patches are available in Section 4.10 (Planned Patches for Next CPU release) of the Critical Patch Update Availability Information for Oracle Server and Middleware Products ( MetaLink Note 455287.1).
The following people or organizations discovered and brought security vulnerabilities addressed by this Critical Patch Update to Oracle's attention: Esteban Martinez Fayo of Application Security, Inc.; Johannes Greil of SEC Consult; Joxean Koret; Joxean Koret working with Tipping Point's Zero Day Initiative; Alexander Kornbrust of Red Database Security GmbH; and David Litchfield of Next Generation Security Software Ltd..
Critical Patch Updates are released on the Tuesday closest to the 15th day of January, April, July and October. The next four dates are:
| 2007-OCT-16 | Initial release |
Oracle Database Executive Summary
This Critical Patch Update contains a total of 28 new security fixes for Oracle Database products, divided as follows:
Oracle Database Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| DB01 | Import | Oracle Net | Create Procedure | No | 6.5 | Network | Low | Single | Partial+ | Partial+ | Partial+ | 9i | 9.0.1.5+, 10.1.0.5 |
| DB02 | Export | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB03 | Oracle Text | Oracle Net | Execute on CTX_DOC | No | 5.5 | Network | Low | Single | Partial | Partial | None | 10g | 10.1.0.5, 10.2.0.3 |
| DB04 | Oracle Text | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial+ | Partial+ | None | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB05 | Oracle Text | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial+ | Partial+ | None | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB06 | Spatial | SQL*NET | Create Session | No | 5.5 | Network | Low | Single | Partial+ | Partial+ | None | 9iR2 | 9.2.0.8, 9.2.0.8DV |
| DB07 | Spatial | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial+ | Partial+ | None | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB08 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB09 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB10 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB11 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB12 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB13 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB14 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB15 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB16 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB17 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB18 | Workspace Manager | Oracle Net | Create Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 9iR2 | See Note 1 |
| DB19 | Advanced Security Option | TCP | None | Yes | 5.0 | Network | Low | None | None | None | Partial | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB20 | Core RDBMS | Network | None | Yes | 5.0 | Network | Low | None | None | None | Partial+ | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| EM01 | Database Control | HTTP | None | Yes | 5.0 | Network | Low | None | Partial | None | None | 10g | 10.1.0.5, 10.2.0.3 |
| DB21 | Oracle Database Vault | HTTP | None | Yes | 5.0 | Network | Low | None | Partial | None | None | 9iR2 | 9.2.0.8DV, 10.2.0.3 |
| DB22 | Oracle Net Services | GIOP | None | Yes | 5.0 | Network | Low | None | None | None | Partial | 9i | 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 |
| DB23 | XML DB | FTP | None | Yes | 5.0 | Network | Low | None | None | Partial | None | 9iR2 | 9.2.0.8, 9.2.0.8DV, 10.1.0.5 |
| AS05 | Oracle Internet Directory | LDAP | None | No | 4.9 | Network | Medium | Single | Partial | Partial | None | 9iR2 | 9.2.0.8, 9.2.0.8DV |
| DB24 | Oracle Database Vault | Oracle Net | Create Session | No | 4.3 | Local | Low | Single | Partial+ | Partial+ | Partial+ | 10gR2 | 10.2.0.3 |
| EM02 | Oracle Help for Web | HTTP | None | Yes | 4.3 | Network | Medium | None | None | Partial | None | 10g | 10.2.0.3 |
| DB25 | Advanced Queuing | Oracle Net | Execute on SYS.DBMS_AQADM | No | 4.0 | Network | Low | Single | None | None | Partial | 9i | 9.0.1.5+, 10.1.0.5 |
| DB26 | SQL Execution | Oracle Net | Create Session | No | 4.0 | Network | Low | Single | None | None | Partial | 10gR2 | 10.2.0.3 |
| DB27 | Spatial | Oracle Net | Create Session | No | 4.0 | Network | Low | Single | None | None | Partial | See Note 2 | See Note 2 |
Notes:
Oracle Database Client-only Installations
No new database security fixes included in this Critical Patch Update affect Oracle Database client-only installations (installations that do not have the Oracle Database installed).
Oracle Secure Enterprise Search
Oracle Secure Enterprise Search 10g is a standalone product that enables searching across a corporation's enterprise information assets. Unless you installed the Oracle Secure Enterprise Search product, it will not be present on your system and no further action is required.
Oracle Secure Enterprise Search security vulnerabilities listed in previous Critical Patch Update advisories are fixed in Oracle Secure Enterprise Search 10g, version 10.1.8.2. Customers on previous versions of Secure Enterprise Search should upgrade to version 10.1.8.2. Instructions on upgrading Oracle Secure Enterprise Search can be found in the Online Documentation. This, and the software to install, is referenced from the Oracle Technology Network Secure Enterprise Search page, on:
http://www.oracle.com/technology/products/oses/index.html.
Oracle Secure Enterprise Search 10g includes Oracle Database 10g version 10.1.0.5, and since vulnerabilities affecting this Database version may affect Oracle Secure Enterprise Search, Oracle recommends that customers apply the October 2007 Critical Patch Update to the embedded Database.
Oracle Audit Vault
Oracle Audit Vault 10g is a standalone product that collects and analyzes audit data from multiple systems. Unless you installed the Oracle Audit Vault product, it will not be present on your system and no further action is required.
Oracle Audit Vault has no security vulnerabilities listed in this or previous Critical Patch Update advisories. Customers on previous versions of Audit Vault should upgrade to version 10.2.2.1. Information about Oracle Audit Vault can be found in the Online Documentation. This, and the Audit Vault software to install, is referenced from the Oracle Technology Network Audit Vault page, on:
http://www.oracle.com/technology/products/audit-vault/index.html.
Oracle Audit Vault 10g includes Oracle Database 10g version 10.2.0.3, and since vulnerabilities affecting this Database version may affect Oracle Audit Vault, Oracle recommends that customers apply the October 2007 Critical Patch Update to the embedded Database.
Oracle Application Express (Formerly Called Oracle HTML DB)
Oracle Application Express (formerly called Oracle HTML DB), is a rapid web application development tool for the Oracle Database. Unless you separately installed Oracle Application Express from a Companion CD supplied with the Oracle Database CD set, or from a packaged downloaded from an Oracle web site, it will not be present on your system and no further action is required.
To check for the presence of Application Express on a system, run the following command from a SQL prompt as SYS:
select username from dba_users where username in ('FLOWS_010500','FLOWS_010600','FLOWS_020000','FLOWS_020200','FLOWS_030000');
If the result is 'no rows selected' then no version of the product is installed and no further action is required. Other output indicates Oracle Application Express is installed, even if it is not actively in use.
There are no Oracle Application Express security vulnerabilities listed in the risk matrix above. Previously announced security vulnerabilities in Oracle Application Express are fixed in version 3.0. All previous versions should be upgraded directly to version 3.0.1. Instructions on upgrading and the software to install Oracle Application Express version 3.0.1 can be found on:
http://www.oracle.com/technology/products/database/application_express/download.html
Oracle Application Server Executive Summary
This Critical Patch Update contains 11 new security fixes for Oracle Application Server. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. No new security fixes are applicable to client-only installations, i.e. installations that do not have Oracle Application Server installed.
Oracle Application Server products that are bundled with the Oracle Database are affected by the vulnerabilities listed in the Oracle Database section. They are not discussed further in this section and are not listed in the Oracle Application Server risk matrix.
Oracle Application Server Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| AS01 | Oracle Process Mgmt & Notification | ONS | None | Yes | 6.8 | Network | Medium | None | Partial+ | Partial+ | Partial+ | 10.1.3 | 10.1.3.3 |
| AS02 | Oracle Portal | HTTP | None | Yes | 5.8 | Network | Medium | None | Partial | Partial | None | 10.1.2 | 10.1.2.0.2, 10.1.4.1 |
| AS03 | Oracle HTTP Server | HTTP | None | Yes | 5.0 | Network | Low | None | None | None | Partial+ | 10.1.3 | 10.1.3.2 |
| AS04 | Oracle Portal | HTTP | None | Yes | 5.0 | Network | Low | None | Partial+ | None | None | 9.0.4 | 9.0.4.3, 10.1.2.0.2 |
| AS05 | Oracle Internet Directory | LDAP | None | No | 4.9 | Network | Medium | Single | Partial | Partial | None | See Note 1 | See Note 1 |
| AS06 | Oracle Containers for J2EE | HTTP | None | Yes | 4.3 | Network | Medium | None | None | Partial | None | 9.0.4 | 9.0.4.3, 10.1.2.0.2, 10.1.2.2, 10.1.3.3 See Note 2 |
| AS07 | Oracle Portal | HTTP | None | Yes | 4.3 | Network | Medium | None | Partial | None | None | 10.1.4 | 10.1.4.1 |
| AS08 | Oracle Internet Directory | LDAP | Valid Session | No | 4.0 | Network | Low | Single | Partial | None | None | 9.0.4 | 9.0.4.3, 10.1.2.0.2, 10.1.2.2, 10.1.4.0 |
| AS09 | Oracle Single Sign-On | HTTP | Valid Session | No | 3.5 | Network | Medium | Single | None | Partial | None | 9.0.4 | 9.0.4.3, 10.1.2.0.2, 10.1.2.2 |
| AS10 | Oracle Single Sign-On | HTTP | None | No | 3.5 | Network | Medium | Single | None | Partial | None | 9.0.4 | 9.0.4.3, 10.1.2.0.2, 10.1.2.2, 10.1.4.0.1 |
| AS11 | Oracle Portal | HTTP | None | Yes | 2.6 | Network | High | None | Partial | None | None | 10.1.2 | 10.1.2.0.2, 10.1.2.2, 10.1.4.1 |
Notes:
Oracle Application Server Client-only Installations
No new security fixes included in this Critical Patch Update affect Oracle Application Server client-only installations.
Oracle Collaboration Suite Executive Summary
There are no new Oracle Collaboration Suite specific fixes in this Critical Patch Update.
This Critical Patch Update contains fixes to 7 Oracle Application Server vulnerabilities that are in code included in Oracle Collaboration Suite. Due to Oracle Collaboration Suite custom files, the steps in MetaLink Note 445172.1 are also required. .
Oracle Collaboration Suite bundles the Oracle Database. All the security fixes listed in the Oracle Database part of the Oracle Database section are applicable. The Oracle Collaboration Suite documentation referenced from this advisory lists the patches that should be installed on Oracle Collaboration Suite instances to fix these Oracle Database issues.
Oracle Collaboration Suite Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| AS02 | Oracle Portal | HTTP | None | Yes | 5.8 | Network | Medium | None | Partial | Partial | None | 10.1.2 | 10.1.2 |
| AS04 | Oracle Portal | HTTP | None | Yes | 5.0 | Network | Low | None | Partial+ | None | None | 10.1.2 | 10.1.2 |
| AS06 | Oracle Containers for J2EE | HTTP | None | Yes | 4.3 | Network | Medium | None | None | Partial | None | 10.1.2 | 10.1.2 |
| AS08 | Oracle Internet Directory | LDAP | Valid Session | No | 4.0 | Network | Low | Single | Partial | None | None | 10.1.2 | 10.1.2 |
| AS9 | Oracle Single Sign-On | HTTP | Valid Session | No | 3.5 | Network | Medium | Single | None | Partial | None | 10.1.2 | 10.1.2 |
| AS10 | Oracle Single Sign-On | HTTP | None | No | 3.5 | Network | Medium | Single | None | Partial | None | 10.1.2 | 10.1.2 |
| AS11 | Oracle Portal | HTTP | None | Yes | 2.6 | Network | High | None | Partial | None | None | 10.1.2 | 10.1.2 |
Oracle E-Business Suite and Applications Executive Summary
This Critical Patch Update contains 8 new security fixes for the Oracle E-Business Suite. 1 of these vulnerabilities may be remotely exploited without authentication, i.e. it may be exploited over a network without the need for a username and password. 1 security vulnerability affects Oracle E-Business Suite client-only installations.
Oracle E-Business Suite 11i includes Oracle9i Application Server, version 1.0.2.2 code, including Oracle Reports Developer. No Oracle Application Server vulnerabilities fixed in this Critical Patch Update affect this version.
Oracle E-Business Suite products include an Oracle Database which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle E-Business Suite risk matrix, but should be patched.
There are no new security fixes specific to Oracle Life Sciences Applications (previously known as Oracle Pharmaceutical Applications). However, Oracle Life Sciences Applications includes Oracle Application Server components that should be patched. The exposure of Oracle Life Sciences Applications depends on the version of Oracle Application Server being used. Please refer to the Oracle Application Server section for more information.
Oracle Life Sciences Applications includes Oracle Database software that is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Life Sciences Applications is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle Life Sciences Applications risk matrix, but should be patched.
Oracle Life Sciences Applications customers should refer to MetaLink Note 455298.1 for detailed information on installing Oracle Application Server and Oracle Database security patches.
Oracle E-Business Suite Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| APP01 | Oracle Application Object Library | HTTP | Valid Session | No | 6.0 | Network | Medium | Single | Partial | Partial | Partial | 11.5.8 | 11.5.10.2 |
| APP02 | Oracle Contracts Integration | HTTP | Valid Session | No | 5.5 | Network | Low | Single | Partial | Partial | None | 11.5.8 | 11.5.10.2 |
| APP03 | Oracle Public Sector Human Resources | HTTP | Valid Session | No | 5.5 | Network | Low | Single | Partial+ | Partial+ | None | 11.5.8 | 12.0.2 |
| APP04 | Oracle Applications Manager | HTTP | None | Yes | 5.0 | Network | Low | None | None | None | Partial+ | 11.5.8 | 11.5.10.2 |
| APP05 | Oracle Marketing | HTTP | Valid Session | No | 4.0 | Network | Low | Single | Partial | None | None | 11.5.8 | 11.5.10.2 |
| APP06 | Oracle Quoting | HTTP | Valid Session | No | 4.0 | Network | Low | Single | Partial+ | None | None | 11.5.8 | 12.0.2 |
| APP07 | Oracle Exchange | HTTP | None | No | 2.1 | Local | Low | None | Partial | None | None | 11.5.8 | 11.5.10.2 |
| APP08 | Oracle Self-Service Web Applications | HTTP | Valid Session | No | 0.0 | Network | Low | Single | None | None | None | 11.5.8 | 11.5.10.2 See Note 1 |
Notes:
Oracle Enterprise Manager Executive Summary
This Critical Patch Update contains 2 new Oracle Enterprise Manager security fixes.
Oracle Enterprise Manager 10g Grid Control includes Oracle Database and Oracle Application Server components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Application Server sections. The Oracle Database and Oracle Application Server vulnerabilities that affect a particular instance of Oracle Enterprise Manager depend on the Oracle Database and Oracle Application Server versions in use. Refer to the risk matrices in the appropriate sections of this document for more information. The Critical Patch Update includes patches for Oracle Database and Oracle Application Server that can be installed to Oracle Enterprise Manager environments, and these patches should be installed.
Releases of Oracle Enterprise Manager before Oracle Enterprise Manager 10g Grid Control include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The Oracle Database vulnerabilities that affect a particular instance of Oracle Enterprise Manager depend on the Oracle Database version in use. Refer to the risk matrices in the appropriate sections of this document for more information. The Critical Patch Update includes patches for Oracle Database that can be installed to Oracle Enterprise Manager environments, and these patches should be installed.
Oracle Enterprise Manager Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| EM01 | Database Control | HTTP | None | Yes | 5.0 | Network | Low | None | Partial | None | None | See Note 1 | See Note 1 |
| EM02 | Oracle Help for Web | HTTP | None | Yes | 4.3 | Network | Medium | None | None | Partial | None | 10g | 10.1.0.6 See Note 2 |
| AS10 | Oracle Single Sign-On | HTTP | Valid Session | No | 3.5 | Network | Medium | Single | None | Partial | None | 10gR2 | 10.1.2 |
Notes:
Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Executive Summary
This Critical Patch Update contains 2 new security fixes for Oracle PeopleSoft Enterprise PeopleTools and 1 new security fix for PeopleSoft Enterprise Human Capital Management. None of these security vulnerabilities may be remotely exploitable without authentication, i.e. may be exploited over a network without the need for a username and password.
There are no new security fixes affecting JD Edwards products.
Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Risk Matrix
| Vuln# | Component | Protocol | Package and/or Privilege Required | Remote Exploit without Auth.? | CVSS VERSION 2.0 RISK (see 394487.1 and Customer Connection) | Earliest Supported Release Affected | Last Affected Patch set (per Supported Release) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score | Access Vector | Access Complexity | Authentication | Confidentiality | Integrity | Availability | |||||||
| PSE01 | People Tools | HTTP | None | No | 4.9 | Network | Medium | Single | Partial+ | Partial+ | None | 8.22 GA, 8.47 GA, 8.48 GA, 8.49 GA | 8.22.17, 8.47.14, 8.48.13, 8.49.05 |
| PSE02 | People Tools | HTTP | Valid Session | No | 4.0 | Network | Low | Single | None | Partial | None | 8.47 GA, 8.48 GA, 8.49 GA | 8.47.14, 8.48.13, 8.49.05 |
| PSE_HCM01 | HCM | HTTP | Valid Session | No | 4.0 | Network | Low | Single | Partial | None | None | 8.9 GA, 9.0 GA | 8.9 Bundle 13 9.0 Bundle 3 |