Feeds

Oracle squashes 109 bugs in quarterly patch batch

Hot fresh Java will flush parasites from your system

Providing a secure and efficient Helpdesk

Oracle published the latest edition of its quarterly patch update on Tuesday, addressing 109 vulnerabilities in 10 products.

The patch batch coincided with a release of a new version of Java, tackling 30 vulnerabilities. The Oracle Java SE critical patch for various supported versions of the software is important because Java vulnerabilities have become a prime target of hacker exploits and zero-days over the last couple of years or so.

This had led to widespread advice from security watchers that Java should be disabled, at least in the browser (most websites don't require it).

Wolfgang Kandek, CTO of cloud security firm Qualys, lists the Java update as among the most pressing priority for patching. Applying patches for Solaris and updating MySQL on internet connected servers also need to prioritised among many updates issued by Oracle on Tuesday.

"The Java update should be applied as soon as possible to workstations and servers," Kandek explained in a blog post. "It contains patches for 10 highly critical vulnerabilities that all have a CVSS of 10, all remotely exploitable without authentication.

"Oracle credits a number of contributors for the vulnerabilities found, including Security Explorations, a security company from Poland that had submitted a large number of vulnerabilities to Oracle in April of this year."

Other crucial updates (that rate the maximum Common Vulnerability Scoring System [CVSS] severity score of 10) include a Oracle RDBMS (relational database management system) patch that tackles a flaw unveiled last month at the Ekoparty security conference in Argentina. Windows servers running the vulnerable software are most at risk of attack.

An update to Oracle's MySQL lances 14 vulnerabilities, two of which can be accessed remotely with authentication. Oracle Solaris and Glassfish products are also affected by flaws that lend themselves to remote exploitation by hackers.

Oracle Fusion Middleware, Peoplesoft, JD Edwards and others also need patching but the vulnerabilities tackled in these cases are less severe and harder to exploit.

"Quite a number of products are being patched, also for those of you subject to PCI DSS [credit card industry regulation] there are a significant number of patches addressing issues with a CVSS score of 4 or higher, which must be patched under the standard," a blog post by the SANS Institute's Internet Storm Centre adds. ®

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.