Feeds

Oracle patch batch to fix 59 flaws

TimesTen, Secure Backup and Solaris

Top three mobile application threats

Oracle plans to release 59 vulnerability fixes, including 21 for Solaris products, as part of its quarterly patch update later on Tuesday.

The highest severity flaws involve bugs in TimesTen In-Memory Database and Oracle Secure Backup. However a big chunk of Oracle's enterprise software product line will need patching for one reason or another. The updates include security fixes for Oracle Database 11g (and earlier versions of the flagship software), Oracle Application Server, Oracle WebLogic Server, Oracle E-Business Suite as well as enterprise software technology acquired from PeopleSoft, among other packages.

The two new security fixes for the TimesTen In-Memory Database address vulnerabilities that might be remotely exploitable without authentication. Three of the five security fixes for Oracle Secure Backup carry the same critical vulnerability risk. Four of the six Oracle Database Server vulnerabilities might also be exploited without the need to log into vulnerable systems but are accessed as a slight lower risk of 7.8 on the CVSS 2.0 scoring system used by Oracle. The Secure Backup and TimesTen security bugs both hit the maximum security (brown alert) rating of 10.0.

Seven of the 21 Oracle Solaris Products Suite flaws are capable of exploitation without authentication. Affected products in this range include Access Manager / OpenSSO, Solaris, Sun Convergence, Sun Java System Application Server and Sun Java System Web Proxy Server, among others.

Altogether the chance of an Oracle admin escaping patching duties are about as good as running through the Dutch defence in last Sunday's World Cup match without a kick in the shins, as can be verified from the detailed list in Oracle's pre-alert notice here. Tuesday's update from Oracle comes at the same time as the expected publication by Microsoft of four bulletins covering three critical flaws including a Windows Help zero-day vulnerability. ®

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.