Feeds

Oracle critical patch plugs 128 security vulns

Database Server, MySQL, Siebel all affected

Using blade systems to cut costs and sharpen efficiencies

Oracle is issuing a hefty patch batch that seals 128 serious security vulnerabilities across the database company's vast product suite.

The Critical Patch Update for April 2013 is due to come out on Tuesday and "Oracle strongly recommends that customers apply Critical Patch Update fixes as soon as possible," the company warns.

Security problems span all of Oracle's key products, including MySQL Server; Solaris; Siebel Enterprise Application Integration; PeopleSoft Enterprise PeopleTools; Oracle WebLogic Server; and Oracle Database Server Application Express, Network Layer, and Workload Manager.

Two of Oracle's key products – Oracle Database Server and Oracle Fusion Middleware – have vulnerabilities that merit the maximum security (brown alert) rating of 10.000, as measured by the Common Vulnerability Scoring System 2.0 metric.

Oracle uses the 'Common Vulnerability Scoring System" to give severity ratings for its bug fixes. The rating reflects the severity of the threat, the ease with which it can be capitalized on, and how the threat works in relation to its overall software environment.

Other vulns range in severity from relatively calm 4.3 ratings (Oracle Supply Chain Products, and Oracle Sun Middleware), up to the more worrying 6.9 for Oracle Support Tools. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.