Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2017-3600: Oracle Critical Patch Update Advisory - April 2017

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).

CVE
#sql#vulnerability#web#android#mac#windows#apple#google#amazon#linux#apache#memcached#js#java#oracle#kubernetes#intel#php#samba#aws#alibaba#auth#ssh#zero_day#docker#sap#ssl
  • Click to view our Accessibility Policy

  • Skip to content

  • Security Alerts

Oracle Critical Patch Update Advisory - April 2017****Description

A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:

Critical Patch Updates and Security Alerts for information about Oracle Security Advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.

This Critical Patch Update contains 300 new security fixes across the product families listed below. Please note that a MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2017 Critical Patch Update: Executive Summary and Analysis.

Please note that the vulnerabilities in this Critical Patch Update are scored using version 3.0 of Common Vulnerability Scoring Standard (CVSS).

This Critical Patch Update advisory is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle’s use of CVRF is available here.

Affected Products and Components

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2017 Documentation Map, My Oracle Support Note.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions

Patch Availability

Oracle Database Server, version(s) 11.2.0.4, 12.1.0.2

Database

Oracle Secure Backup, version(s) prior to 12.1.0.3.0

Oracle Secure Backup

Oracle Berkeley DB, version(s) prior to 6.2.32

Berkeley DB

Oracle API Gateway, version(s) 11.1.2.4.0

Fusion Middleware

Oracle Fusion Middleware, version(s) 11.1.1.7, 11.1.1.9, 11.1.2.2, 11.1.2.3, 12.1.3.0, 12.2.1.0, 12.2.1.1

Fusion Middleware

Oracle Fusion Middleware MapViewer, version(s) 11.1.1.9, 12.2.1.1, 12.2.1.2

Fusion Middleware

Oracle GlassFish Server, version(s) 3.1.2

Fusion Middleware

Oracle Identity Manager, version(s) 11.1.2.3.0

Fusion Middleware

Oracle Service Bus, version(s) 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

Fusion Middleware

Oracle Social Network, version(s) prior to 11.1.12.0.0 (17019101)

Fusion Middleware

Oracle WebCenter Content, version(s) 11.1.1.7, 11.1.1.9, 12.2.1.0, 12.2.1.1, 12.2.1.2

Fusion Middleware

Oracle WebCenter Sites, version(s) 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

Fusion Middleware

Oracle WebLogic Server, version(s) 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2

Fusion Middleware

Oracle Hyperion Essbase, version(s) 11.1.2.2

Fusion Middleware

Enterprise Manager Base Platform, version(s) 12.1.0, 13.1.0, 13.2.0

Enterprise Manager

Oracle E-Business Suite, version(s) 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

E-Business Suite

Oracle Transportation Manager, version(s) 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, 6.4.1, 6.4.2

Oracle Supply Chain Products

PeopleSoft Enterprise CS Campus Community, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise FIN Receivables, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise FSCM, version(s) 9.1

PeopleSoft

PeopleSoft Enterprise PeopleTools, version(s) 8.54, 8.55

PeopleSoft

PeopleSoft Enterprise SCM eBill Payment, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise SCM eSupplier Connection, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise SCM Purchasing, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise SCM Service Procurement, version(s) 9.2

PeopleSoft

PeopleSoft Enterprise SCM Strategic Sourcing, version(s) 9.2

PeopleSoft

JD Edwards EnterpriseOne Tools, version(s) 9.2

JD Edwards

Siebel Applications, version(s) 6.1, 6.2, 7.0, 7.1

Siebel

Oracle Commerce Guided Search / Oracle Commerce Experience Manager, version(s) 6.1.4, 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2, 11.0, 11.1, 11.2

Oracle Commerce

Oracle Fusion Applications, version(s) 11.1.2 through 11.1.9

Fusion Applications

Oracle Communications ASAP, version(s) 7.0, 7.2, 7.3

Oracle Communications ASAP

Oracle Communications Network Integrity, version(s) 7.2.4, 7.3.0

Oracle Communications Network Integrity

Oracle Communications Policy Management, version(s) 12.2

Oracle Communications Policy Management

Oracle Communications Security Gateway, version(s) 3.0.0

Oracle Communications Security Gateway

Oracle Communications Service Broker Engineered System Edition, version(s) 6.0, 6.1

Oracle Communications Service Broker Engineered System Edition

Oracle Communications Session Border Controller, version(s) SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

Oracle Communications Session Border Controller

Oracle Financial Services Analytical Applications Infrastructure, version(s) 7.3.3, 7.3.4, 7.3.5

Oracle Financial Services Analytical Applications Infrastructure

Oracle Financial Services Asset Liability Management, version(s) 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Asset Liability Management

Oracle Financial Services Basel Regulatory Capital Basic, version(s) 6.1.2, 6.1.3, 8.0.2, 8.0.3

Oracle Financial Services Basel Regulatory Capital Basic

Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach, version(s) 6.1.2, 6.1.3, 8.0.2, 8.0.3

Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach

Oracle Financial Services Data Foundation, version(s) 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Data Foundation

Oracle Financial Services Data Integration Hub, version(s) 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Data Integration Hub

Oracle Financial Services Enterprise Financial Performance Analytics, version(s) 8.0.0 to 8.0.4

Oracle Financial Services Enterprise Financial Performance Analytics

Oracle Financial Services Funds Transfer Pricing, version(s) 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Funds Transfer Pricing

Oracle Financial Services Hedge Management and IFRS Valuations, version(s) 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Hedge Management and IFRS Valuations

Oracle Financial Services Institutional Performance Analytics, version(s) 8.0.0 to 8.0.4

Oracle Financial Services Institutional Performance Analytics

Oracle Financial Services Liquidity Risk Management, version(s) 8.0.1, 8.0.2, 8.0.4

Oracle Financial Services Liquidity Risk Management

Oracle Financial Services Loan Loss Forecasting and Provisioning, version(s) 1.5.0, 1.5.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Loan Loss Forecasting and Provisioning

Oracle Financial Services Pricing Management/Transfer Pricing Component, version(s) 8.0.0 to 8.0.4

Oracle Financial Services Pricing Management, Transfer Pricing Component

Oracle Financial Services Profitability Management, version(s) 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Financial Services Profitability Management

Oracle Financial Services Reconciliation Framework, version(s) 8.0.0, 8.0.1, 8.0.2

Oracle Financial Services Analytical Applications Reconciliation Framework

Oracle Financial Services Retail Customer Analytics, version(s) 8.0.0 to 8.0.3

Oracle Financial Services Retail Customer Analytics

Oracle Financial Services Retail Performance Analytics, version(s) 8.0.0 to 8.0.4

Oracle Financial Services Retail Performance Analytics

Oracle FLEXCUBE Direct Banking, version(s) 12.0.2, 12.0.3

Oracle Financial Services Applications

Oracle FLEXCUBE Enterprise Limits and Collateral Management, version(s) 12.0.0, 12.0.1, 12.1.0

Oracle Financial Services Applications

Oracle FLEXCUBE Investor Servicing, version(s) 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

Oracle Financial Services Applications

Oracle FLEXCUBE Private Banking, version(s) 2.0.0, 2.0.1, 2.2.0.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0

Oracle Financial Services Applications

Oracle FLEXCUBE Universal Banking, version(s) 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0

Oracle Financial Services Applications

Oracle Insurance Data Foundation, version(s) 8.0.1, 8.0.2, 8.0.3, 8.0.4

Oracle Insurance Data Foundation

Oracle Healthcare Master Person Index, version(s) 3.0.0.x and 4.0.1.x, prior to and 2.0.1.x

Health Sciences

Oracle Hospitality OPERA 5 Property Services, version(s) 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

Oracle Hospitality OPERA 5 Property Services

Oracle Insurance Istream, version(s) 4.3.2 and prior

Oracle Insurance Applications

MICROS Lucas, version(s) 2.9.5.1, 2.9.5.2, 2.9.5.3, 2.9.5.4, 2.9.5.5

Retail Applications

MICROS Relate CRM Software, version(s) 10.0, 10.5, 10.8, 11.0, 11.1, 11.4, 15.0

Retail Applications

MICROS XBR, version(s) 10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1

Retail Applications

MICROS Xstore Payment, version(s) 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0

Retail Applications

Oracle Retail Advanced Inventory Planning, version(s) 14.1, 15.0

Retail Applications

Oracle Retail Advanced Science Engine, version(s) 14.1

Retail Applications

Oracle Retail Analytic Parameter Calculator - RO, version(s) 15.0

Retail Applications

Oracle Retail Analytics, version(s) 14.0, 14.1, 15.0, 16.0

Retail Applications

Oracle Retail Assortment Planning, version(s) 14.1.3, 15.0.1, 16.0.0

Retail Applications

Oracle Retail Back Office, version(s) 14.1

Retail Applications

Oracle Retail Category Management, version(s) 13.2, 13.3, 14.0, 14.1

Retail Applications

Oracle Retail Category Management Planning & Optimization, version(s) 15.0

Retail Applications

Oracle Retail Customer Insights, version(s) 15.0

Retail Applications

Oracle Retail Customer Management and Segmentation Foundation, version(s) 15.0

Retail Applications

Oracle Retail Demand Forecasting, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Invoice Matching, version(s) 12.0, 13.0, 13.1, 13.2, 14.0, 14.1

Retail Applications

Oracle Retail Item Planning, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Macro Space Optimization, version(s) 15.0.2

Retail Applications

Oracle Retail Merchandise Financial Planning, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Merchandising Insights, version(s) 15.0

Retail Applications

Oracle Retail Open Commerce Platform, version(s) 4.0, 5.0, 5.1, 5.3, 6.0, 6.1, 15.0, 16.0

Retail Applications

Oracle Retail Order Broker, version(s) 5.1, 5.2, 15.0, 16.0

Retail Applications

Oracle Retail Point-of-Service, version(s) 14.1.3

Retail Applications

Oracle Retail Predictive Application Server, version(s) 13.1, 13.2, 13.3, 13.3.3, 13.4, 13.4.3, 14.0, 14.0.3, 14.1, 14.1.3, 15.0, 15.0.2, 16.0.0

Retail Applications

Oracle Retail Regular Price Optimization, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Replenishment Optimization, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Returns Management, version(s) 14.1

Retail Applications

Oracle Retail Size Profile Optimization, version(s) 14.1.3, 15.0.2

Retail Applications

Oracle Retail Store Inventory, version(s) 14.1, 15.0, 16.0

Retail Applications

Oracle Retail Warehouse Management System, version(s) 13.2, 14.0, 15.0

Retail Applications

Oracle Retail XBRi Loss Prevention, version(s) 10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1

Retail Applications

Oracle Retail Xstore Point of Service, version(s) 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0

Retail Applications

Oracle Real-Time Scheduler, version(s) 2.2.0.3.13, 2.3.0.0, 2.3.0.1

Oracle Utilities Applications

Oracle Utilities Customer Self Service, version(s) 2.1.0.2.0

Oracle Utilities Applications

Oracle Utilities Framework, version(s) 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

Oracle Utilities Applications

Oracle Utilities Work and Asset Management, version(s) 1.9.1.2.11

Oracle Utilities Applications

Primavera Gateway, version(s) 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2

Oracle Primavera Products Suite

Primavera P6 Enterprise Project Portfolio Management, version(s) 8.3, 8.4, 15.1, 15.2, 16.1, 16.2

Oracle Primavera Products Suite

Primavera Unifier, version(s) 9.13, 9.14, 10.0, 10.1, 15.1, 15.2

Oracle Primavera Products Suite

Oracle Java SE, version(s) 6u141, 7u131, 8u121

Oracle Java SE

Oracle Java SE Embedded, version(s) 8u121

Oracle Java SE

Oracle JRockit, version(s) R28.3.13

Oracle Java SE

Oracle SuperCluster Specific Software, version(s) 2.3.8, 2.3.13

Oracle and Sun Systems Products Suite

Solaris, version(s) 10, 11.3

Oracle and Sun Systems Products Suite

Solaris Cluster, version(s) 4.3

Oracle and Sun Systems Products Suite

StorageTek Tape Analytics SW Tool, version(s) prior to 2.2.1

Oracle and Sun Systems Products Suite

Sun ZFS Storage Appliance Kit (AK), version(s) AK 2013

Oracle and Sun Systems Products Suite

Oracle VM VirtualBox, version(s) prior to 5.0.38, prior to 5.1.20

Oracle Linux and Virtualization

Secure Global Desktop, version(s) 4.71, 5.2, 5.3

Oracle Linux and Virtualization

MySQL Cluster, version(s) 7.2.27 and prior, 7.3.16 and prior, 7.4.14 and prior, 7.5.5 and prior

Oracle MySQL Product Suite

MySQL Connectors, version(s) 2.1.5 and prior, 5.1.41 and prior

Oracle MySQL Product Suite

MySQL Enterprise Backup, version(s) 3.12.3 and prior, 4.0.3 and prior

Oracle MySQL Product Suite

MySQL Enterprise Monitor, version(s) 3.1.6.8003 and prior, 3.2.1182 and prior, 3.3.2.1162 and prior

Oracle MySQL Product Suite

MySQL Server, version(s) 5.5.55 and prior, 5.6.35 and prior, 5.7.17 and prior, 5.7.11 to 5.7.17

Oracle MySQL Product Suite

MySQL Workbench, version(s) 6.3.8 and prior

Oracle MySQL Product Suite

Automatic Service Request (ASR), version(s) prior to 5.7

Oracle Support Tools

Oracle Advanced Support Gateway, version(s) prior to 7.2

Oracle Support Tools

Oracle Trace File Analyzer (TFA), version(s) prior to 12.1.2.8.4

Oracle Support Tools

OSS Support Tools, version(s) prior to RDA 8.15.17.3.14

Oracle Support Tools

Note:

  • Vulnerabilities affecting Oracle Database and Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document, My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.
  • Users running Java SE with a browser can download the latest release from http://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.
  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security fixes required to resolve ZFSSA issues published in Critical Patch Updates (CPUs) and Solaris Third Party bulletins.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.0).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. Until you apply the CPU fixes, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security fixes as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security fixes announced in this CPU, please review previous Critical Patch Update advisories to determine appropriate actions.

Product Dependencies

Oracle products may have dependencies on other Oracle products. Hence security vulnerability fixes announced in this Critical Patch Update may affect one or more dependent Oracle products. For details regarding these dependencies and how to apply patches to dependent products, please refer to Patch Set Update and Critical Patch Update April 2017 Availability Document, My Oracle Support Note 2228898.1.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Critical Patch Update program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Critical Patch Update program for products in the Extended Support Phase.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • Abhishek Nandawat: CVE-2017-3495
  • Akshay Jain: CVE-2017-3499
  • Alexey Tyurin of ERPScan: CVE-2017-3555, CVE-2017-3556
  • An Anonymous researcher via Beyond Security’s SecuriTeam Secure Disclosure Program: CVE-2017-3533
  • Andrea Micalizzi aka rgod, working with Trend Micro’s Zero Day Initiative: CVE-2017-3230
  • Andrew Gill of Pentest Limited: CVE-2017-3528
  • Arun Babu of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517
  • Binoy Koonammavu of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517
  • Can Demirel and Faruk Unal of Biznet Bilisim A.S: CVE-2017-3621
  • Deniz Cevik of Biznet Bilisim A.S.: CVE-2017-3625
  • Devin Rosenbauer of Identity Works LLC: CVE-2017-3506, CVE-2017-3553
  • Dmitrii Iudin aka @ret5et: CVE-2017-3547
  • Dmitry Chastuhin of ERPScan: CVE-2017-3549
  • Emiliano J. Fausto of Onapsis: CVE-2017-3550
  • Florian Bogner: CVE-2017-3511
  • Gaston Traberg of Onapsis: CVE-2017-3337, CVE-2017-3393, CVE-2017-3432
  • Hanno Böck: CVE-2017-3604, CVE-2017-3605, CVE-2017-3606, CVE-2017-3607, CVE-2017-3608, CVE-2017-3609, CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615, CVE-2017-3616
  • Ivan Chalykin of ERPScan: CVE-2017-3555, CVE-2017-3556, CVE-2017-3557
  • Jacob Baines of Tenable Network Security: CVE-2017-3531
  • Jakub Palaczynski of ING Services Polska: CVE-2017-3528
  • James Forshaw: CVE-2017-3563
  • Jann Horn: CVE-2017-3538, CVE-2017-3558, CVE-2017-3561, CVE-2017-3575, CVE-2017-3576
  • Jason Bertman: CVE-2017-3545, CVE-2017-3554, CVE-2017-3591
  • John S Andersen of Intel: CVE-2017-3513
  • Jussi of CERT-FI: CVE-2017-3540
  • Khajornchol Puwarang of Mindterra Red Team: CVE-2017-3520
  • Kyle Stiemann of Liferay: CVE-2017-3626
  • Li Qiang of the Qihoo 360 Gear Team: CVE-2017-3559
  • Lionel Debroux: CVE-2017-3604, CVE-2017-3605, CVE-2017-3606, CVE-2017-3607, CVE-2017-3608, CVE-2017-3609, CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615, CVE-2017-3616, CVE-2017-3617
  • loopx9: CVE-2017-3506
  • Manich Koomsusi of Mindterra Red Team: CVE-2017-3520
  • Marcin Zięba of Prevenity: CVE-2017-3507
  • Mateusz Jurczyk of Google Project Zero: CVE-2017-3587
  • Matias Mevied of Onapsis: CVE-2017-3337, CVE-2017-3393, CVE-2017-3432
  • Mickey Shkatov of Intel: CVE-2017-3513
  • Mohammed Saty of PricewaterhouseCoopers: CVE-2017-3254
  • Moritz Bechler: CVE-2017-3509
  • Nada Alnoaimi of Saudi Aramco: CVE-2017-3501
  • Nadezhda Krivdyuk of ERPScan: CVE-2017-3548
  • Or Hanuka of Motorola Solutions: CVE-2017-3579, CVE-2017-3583
  • Peter Kostiuk of Salesforce.com: CVE-2017-3232, CVE-2017-3233, CVE-2017-3234, CVE-2017-3237, CVE-2017-3504, CVE-2017-3505, CVE-2017-3581, CVE-2017-3618, CVE-2017-3619, CVE-2017-3620
  • Thijs Alkemade of Computest: CVE-2017-3523
  • Renjith TC of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517
  • Rodrigo Marcos of Secforce: CVE-2017-3599
  • Roman Shalymov of ERPScan: CVE-2017-3546, CVE-2017-3547
  • Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.: CVE-2017-3593, CVE-2017-3594, CVE-2017-3595, CVE-2017-3596, CVE-2017-3597, CVE-2017-3598, CVE-2017-3602, CVE-2017-3603
  • Tawatchai Pinsuwan of Mindterra Red Team: CVE-2017-3520
  • Teemu Kääriäinen (Nixu): CVE-2017-3540, CVE-2017-3542, CVE-2017-3543
  • Tzachy Horesh of Motorola Solutions: CVE-2017-3579, CVE-2017-3583
  • Ubais PK of EY Global Delivery Services: CVE-2017-3534, CVE-2017-3535
  • William Roberts of Intel: CVE-2017-3513
  • Zuozhi Fan formerly of Alibaba: CVE-2017-3309, CVE-2017-3331, CVE-2017-3453, CVE-2017-3456, CVE-2017-3463

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update Advisory, Oracle recognizes Alexey Tyurin of ERPScan; David Litchfield formerly of Google; Eric Gruber of Netspi; Ivan Chalykin of ERPScan; Jeffrey Walton; Khai Tran formerly of Netspi; MMakhil; Roman Shalymov of ERPScan (2 reports); Suraj Khetani of Gulf Business Machines; and Xiejingwei Fei of FINRA for contributions to Oracle’s Security-In-Depth program.

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.

For this quarter, Oracle recognizes Adam Willard of Blue Canopy (2 reports); Cédric Bühler; Daniël van Eeden; Hamdi Charfeddine of Tunisian WhiteHat Security; Harsh Joshi of Infomenia Technologies; Jasmin Landry; Jhayz Rubio; Mala; Mat Werber of Amazon Web Services IT Security; Mazlum Bozan; Md. Nur A Alam Dipu; Mohammed Khalid Almouty; Muhammad nurnobi of Serverghosts; Muhammad Uwais; Sreedeep.Ck Alavil of Kerala Police Cyber Dome Volunteers Commander; Suleman Malik; Sumit Sahoo (54H00); Suvadip Kar; and Tansel Çetin for contributions to Oracle’s On-Line Presence Security program.

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 18 July 2017
  • 17 October 2017
  • 16 January 2018
  • 17 April 2018

References

  • Oracle Critical Patch Updates and Security Alerts main page [ Oracle Technology Network ]
  • Critical Patch Update - April 2017 Documentation Map [ My Oracle Support Note ]
  • Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions [ CPU FAQ ]
  • Risk Matrix definitions [ Risk Matrix Definitions ]
  • Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS Scoring ]
  • English text version of the risk matrices [ Oracle Technology Network ]
  • CVRF XML version of the risk matrices [ Oracle Technology Network ]
  • The Oracle Software Security Assurance Blog [ The Oracle Software Security Assurance Blog ]
  • List of public vulnerabilities fixed in Critical Patch Updates and Security Alerts [ Oracle Technology Network ]
  • Software Error Correction Support Policy [ My Oracle Support Note 209768.1 ]

Modification History

Date

Note

2017-June-20

Rev 5. Updated CVSS score for CVE-2017-3337, CVE-2017-3393, CVE-2017-3432, CVE-2017-3515, CVE-2017-3528, CVE-2017-3550, CVE-2017-3556 and CVE-2017-3557.

2017-May-18

Rev 4. Updated affected versions for CVE-2012-0920, CVE-2013-5209, CVE-2015-0204 and CVE-2016-6304.

2017-May-02

Rev 3. Updated affected releases for CVE-2017-3305. Updated “Credit Statement” section.

2017-April-21

Rev 2. Added CVE-2017-3523. Added note for CVE-2017-3600. Updated “On-Line Presence Security Contributors” section.

2017-April-18

Rev 1. Initial Release.

Appendix - Oracle Database Server****Oracle Database Server Executive Summary

This Critical Patch Update contains 3 new security fixes for the Oracle Database Server divided as follows:

  • 2 new security fixes for the Oracle Database Server. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. 1 of these fixes is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
  • 1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Database Server Risk Matrix

CVE#

Component

Package and/or Privilege Required

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3486

SQL*Plus

Local Logon

Oracle Net

No

7.2

Local

High

High

Required

Changed

High

High

High

11.2.0.4, 12.1.0.2

See Note 1

CVE-2017-3567

OJVM

Create Session, Create Procedure

Multiple

No

5.3

Network

High

Low

None

Un- changed

None

None

High

11.2.0.4, 12.1.0.2

Notes:

  1. This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 6.3 with scope Unchanged.

Oracle Database Server Client-Only Installations

The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2017-3486.

Oracle Secure Backup Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Secure Backup Risk Matrix

CVE#

Component

Package and/or Privilege Required

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2016-6290

PHP

None

Multiple

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

Prior to 12.1.0.3.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-6290 also addresses CVE-2016-6288, CVE-2016-6289, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, and CVE-2016-6297.

Appendix - Oracle Berkeley DB****Oracle Berkeley DB Executive Summary

This Critical Patch Update contains 14 new security fixes for Oracle Berkeley DB. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Berkeley DB Risk Matrix

CVE#

Component

Package and/or Privilege Required

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3604

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3605

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3606

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3607

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3608

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3609

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3610

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3611

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3612

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3613

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3614

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3615

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3616

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

CVE-2017-3617

Data Store

None

None

No

7.0

Local

High

None

Required

Un- changed

High

High

High

Prior to 6.2.32

Appendix - Oracle Fusion Middleware****Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 31 new security fixes for Oracle Fusion Middleware. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Fusion Middleware Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

Oracle WebCenter Sites

Third Party Tools (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3553

Oracle Identity Manager

Rules Engine

HTTP

No

9.9

Network

Low

Low

None

Changed

High

High

High

11.1.2.3.0

CVE-2016-6303

Oracle API Gateway

Oracle API Gateway (OpenSSL)

HTTPS

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

11.1.2.4.0

CVE-2015-7501

Oracle Fusion Middleware MapViewer

Install (Apache Commons Collections)

HTTP

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

11.1.1.9, 12.2.1.1, 12.2.1.2

CVE-2017-5638

Oracle WebLogic Server

Samples (Struts 2)

HTTP

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2

CVE-2016-0714

Oracle WebCenter Sites

Apache Tomcat

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

11.1.1.8.0

CVE-2015-7501

Oracle WebCenter Sites

Sites (Apache Commons Collections)

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3230

Oracle Fusion Middleware MapViewer

Map Builder

HTTP

Yes

8.6

Network

Low

None

None

Un- changed

Low

High

Low

11.1.1.9, 12.2.1.1, 12.2.1.2

CVE-2017-3540

Oracle WebCenter Sites

Server

HTTP

Yes

8.6

Network

Low

None

None

Un- changed

Low

Low

High

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3542

Oracle WebCenter Sites

Server

HTTP

Yes

8.6

Network

Low

None

None

Un- changed

High

Low

Low

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3543

Oracle WebCenter Sites

Server

HTTP

Yes

8.6

Network

Low

None

None

Un- changed

High

Low

Low

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3625

Oracle WebCenter Content

Content Server

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

11.1.1.7, 11.1.1.9, 12.2.1.0, 12.2.1.1, 12.2.1.2

CVE-2017-3545

Oracle WebCenter Sites

Blob Server

HTTP

Yes

8.2

Network

Low

None

None

Un- changed

Low

High

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3541

Oracle WebCenter Sites

Server

HTTP

Yes

8.2

Network

Low

None

None

Un- changed

High

Low

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3601

Oracle API Gateway

Oracle API Gateway

HTTP

Yes

8.1

Network

Low

None

Required

Un- changed

High

High

None

11.1.2.4.0

CVE-2017-3602

Oracle WebCenter Sites

Advanced UI

HTTP

No

8.1

Network

Low

Low

None

Un- changed

High

High

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3554

Oracle WebCenter Sites

Catalog Mover

HTTP

No

8.1

Network

Low

Low

None

Un- changed

High

High

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2016-1181

Oracle WebLogic Server

Samples (Struts 1)

HTTP

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2

CVE-2017-3596

Oracle WebCenter Sites

Advanced UI

HTTP

No

7.6

Network

Low

Low

None

Un- changed

High

Low

Low

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3499

Oracle Social Network

Android Client

HTTPS

Yes

7.5

Network

Low

None

None

Un- changed

High

None

None

prior to 11.1.12.0.0 (17019101)

CVE-2017-3506

Oracle WebLogic Server

Web Services

HTTP

Yes

7.4

Network

High

None

None

Un- changed

High

High

None

10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2

CVE-2017-3507

Oracle Service Bus

Web Console Design

HTTP

Yes

7.3

Network

Low

None

None

Un- changed

Low

Low

Low

12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3531

Oracle WebLogic Server

Servlet Runtime

HTTP

Yes

7.2

Network

Low

None

None

Changed

None

Low

Low

12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2

CVE-2017-3593

Oracle WebCenter Sites

Advanced UI

HTTP

Yes

7.1

Network

Low

None

Required

Un- changed

High

Low

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3595

Oracle WebCenter Sites

Advanced UI

HTTP

No

7.1

Network

Low

Low

None

Un- changed

High

Low

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3591

Oracle WebCenter Sites

Catalog Mover

HTTP

Yes

7.1

Network

Low

None

Required

Un- changed

Low

High

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3594

Oracle WebCenter Sites

Advanced UI

HTTP

No

5.9

Network

High

Low

None

Un- changed

High

Low

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3597

Oracle WebCenter Sites

Advanced UI

HTTP

No

5.7

Network

Low

Low

Required

Un- changed

High

None

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3626

Oracle GlassFish Server

Java Server Faces

Multiple

Yes

3.1

Network

High

None

Required

Un- changed

Low

None

None

3.1.2

CVE-2017-3598

Oracle WebCenter Sites

Advanced UI

HTTP

No

3.1

Network

High

Low

None

Un- changed

Low

None

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

CVE-2017-3603

Oracle WebCenter Sites

Advanced UI

HTTP

No

3.1

Network

High

Low

None

Un- changed

Low

None

None

11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706, and CVE-2016-0763.
  • The fix for CVE-2016-1181 also addresses CVE-2012-1007, CVE-2014-0114, and CVE-2016-1182.
  • The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix - Oracle Hyperion****Oracle Hyperion Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Hyperion. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hyperion Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2015-3237

Oracle Hyperion Essbase

Security (libcurl)

HTTP

Yes

6.5

Network

Low

None

None

Un- changed

Low

None

Low

11.1.2.2

Additional CVEs addressed are below:

  • The fix for CVE-2015-3237 also addresses CVE-2015-3236.

Appendix - Oracle Enterprise Manager Grid Control****Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle Enterprise Manager Grid Control. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2016-3092

Enterprise Manager Base Platform

Security Framework

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

12.1.0, 13.1.0, 13.2.0

CVE-2017-3518

Enterprise Manager Base Platform

Discovery Framework

HTTPS

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

12.1.0, 13.1.0, 13.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2017-3518 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix - Oracle Applications****Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle E-Business Suite. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2017), My Oracle Support Note 2241313.1.

Some of the risk matrix rows in this section are assigned multiple CVE#s. In these cases, additional CVEs are listed below the risk matrix to improve readability. Each group of CVE identifiers share the same description, vulnerability type, Component, Sub-Component and affected versions listed in the risk matrix entry, but occur in different code sections within a Sub-Component.

Oracle E-Business Suite Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3549

Oracle Scripting

Scripting Administration

HTTP

Yes

9.1

Network

Low

None

None

Un- changed

High

High

None

12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3393

Oracle Advanced Outbound Telephony

Interaction History

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3550

Oracle Customer Interaction History

Admin Console

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

12.1.1, 12.1.2, 12.1.3

CVE-2017-3337

Oracle Marketing

User Interface

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3432

Oracle One-to-One Fulfillment

Audience workbench

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

12.1.1, 12.1.2, 12.1.3

CVE-2017-3557

Oracle One-to-One Fulfillment

Print Server

HTTP

Yes

8.2

Network

Low

None

Required

Changed

High

Low

None

12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3555

Oracle iReceivables

Self Registration

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3592

Oracle Payables

Self Service Manager

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3528

Oracle Applications Framework

Popup windows (lists of values, datepicker, etc.)

HTTP

Yes

4.7

Network

Low

None

Required

Changed

None

Low

None

12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3515

Oracle User Management

User Name/Password Management

HTTP

Yes

4.7

Network

Low

None

Required

Changed

None

Low

None

12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

CVE-2017-3556

Oracle Application Object Library

File Management

HTTP

Yes

3.7

Network

High

None

None

Un- changed

Low

None

None

12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

Additional CVEs addressed are below:

  • The fix for CVE-2017-3337 also addresses CVE-2017-3342, CVE-2017-3345, CVE-2017-3347, CVE-2017-3355, and CVE-2017-3356.
  • The fix for CVE-2017-3432 also addresses CVE-2017-3434.

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 1 new security fix for the Oracle Supply Chain Products Suite. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Supply Chain Products Suite Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3530

Oracle Transportation Manager

Security

HTTP

No

6.1

Network

Low

High

Required

Un- changed

High

High

None

6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, 6.4.1, 6.4.2

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 16 new security fixes for Oracle PeopleSoft Products. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle PeopleSoft Products Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3519

PeopleSoft Enterprise PeopleTools

Security

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

High

None

None

8.54, 8.55

CVE-2017-3547

PeopleSoft Enterprise PeopleTools

MultiChannel Framework

HTTP

Yes

7.4

Network

Low

None

Required

Changed

None

High

None

8.54, 8.55

CVE-2017-3577

PeopleSoft Enterprise CS Campus Community

Frameworks

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3570

PeopleSoft Enterprise FSCM

eSettlements

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.1

CVE-2017-3520

PeopleSoft Enterprise PeopleTools

Fluid Core

HTTP

Yes

6.5

Network

Low

None

Required

Un- changed

None

High

None

8.54, 8.55

CVE-2017-3548

PeopleSoft Enterprise PeopleTools

Integration Broker

HTTP

Yes

6.5

Network

Low

None

None

Un- changed

Low

None

Low

8.54, 8.55

CVE-2017-3546

PeopleSoft Enterprise PeopleTools

MultiChannel Framework

HTTP

Yes

6.5

Network

Low

None

None

Un- changed

Low

Low

None

8.54, 8.55

CVE-2014-3596

PeopleSoft Enterprise PeopleTools

Portal

HTTP

Yes

6.5

Network

Low

None

None

Un- changed

Low

Low

None

8.54, 8.55

CVE-2017-3521

PeopleSoft Enterprise SCM Purchasing

Supplier Registration

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3525

PeopleSoft Enterprise SCM Service Procurement

Usability

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3524

PeopleSoft Enterprise SCM Strategic Sourcing

Bidder Registration

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3571

PeopleSoft Enterprise SCM eBill Payment

Security

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3522

PeopleSoft Enterprise SCM eSupplier Connection

Vendor

HTTP

No

6.5

Network

Low

High

None

Un- changed

High

High

None

9.2

CVE-2017-3502

PeopleSoft Enterprise FIN Receivables

Receivables

HTTP

Yes

5.3

Network

Low

None

None

Un- changed

None

Low

None

9.2

CVE-2017-3527

PeopleSoft Enterprise PeopleTools

Fluid Core

HTTP

Yes

5.3

Network

Low

None

None

Un- changed

Low

None

None

8.54, 8.55

CVE-2017-3536

PeopleSoft Enterprise PeopleTools

Security

HTTP

No

4.6

Network

Low

Low

Required

Un- changed

Low

Low

None

8.54, 8.55

Oracle JD Edwards Products Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle JD Edwards Products. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle JD Edwards Products Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3517

JD Edwards EnterpriseOne Tools

Web Runtime SEC

HTTP

Yes

6.5

Network

Low

None

None

Un- changed

Low

None

Low

9.2

Oracle Siebel CRM Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Siebel CRM. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Siebel CRM Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

Siebel Apps - E-Billing

Security (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.1, 6.2, 7.0, 7.1

Oracle Commerce Executive Summary

This Critical Patch Update contains 3 new security fixes for Oracle Commerce. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Commerce Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3572

Oracle Commerce Guided Search / Oracle Commerce Experience Manager

MDEX

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2

CVE-2016-6304

Oracle Commerce Guided Search / Oracle Commerce Experience Manager

MDEX

HTTPS

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2

CVE-2016-2107

Oracle Commerce Guided Search / Oracle Commerce Experience Manager

Platform Services

HTTPS

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

6.1.4, 11.0, 11.1, 11.2

Additional CVEs addressed are below:

  • The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, and CVE-2016-2176.
  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6306, CVE-2016-7052, CVE-2016-7055, CVE-2017-3731, and CVE-2017-3732.

Appendix - Oracle Communications Applications****Oracle Communications Applications Executive Summary

This Critical Patch Update contains 11 new security fixes for Oracle Communications Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Communications Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

Oracle Communications Policy Management

Security (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

12.2

CVE-2016-0729

Oracle Communications ASAP

Security (Xerces)

HTTP

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

7.0, 7.2, 7.3

CVE-2016-0635

Oracle Communications Network Integrity

Security (Spring)

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

7.3.0, 7.2.4

CVE-2016-3092

Oracle Communications Service Broker Engineered System Edition

Install (Apache Commons FileUpload)

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

6.0, 6.1

CVE-2013-5209

Oracle Communications Session Border Controller

Sysadmin (SCTP)

SCTP

Yes

7.5

Network

Low

None

None

Un- changed

High

None

None

SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

CVE-2016-6304

Oracle Communications Session Border Controller

Routing (OpenSSL)

TLS

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

CVE-2012-0920

Oracle Communications Session Border Controller

Sysadmin (Dropbear)

SSH

No

7.1

Network

High

Low

Required

Un- changed

High

High

High

SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

CVE-2017-3732

Oracle Communications Security Gateway

Routing (OpenSSL)

TLS

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

3.0.0

CVE-2013-2566

Oracle Communications Session Border Controller

Sysadmin

SSH

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

SCZ7.3.0, SCZ7.4.0

CVE-2017-3470

Oracle Communications Security Gateway

Network

ICMP Ping

Yes

5.3

Network

Low

None

None

Un- changed

None

None

Low

3.0.0

CVE-2015-0204

Oracle Communications Session Border Controller

Routing

TLS

Yes

5.3

Network

Low

None

None

Un- changed

None

Low

None

SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2014-3571, CVE-2015-0286, CVE-2015-1791, CVE-2015-3195, and CVE-2016-2107.
  • The fix for CVE-2017-3732 also addresses CVE-2014-3571, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, and CVE-2015-1792.

Appendix - Oracle Financial Services Applications****Oracle Financial Services Applications Executive Summary

This Critical Patch Update contains 47 new security fixes for Oracle Financial Services Applications. 25 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Financial Services Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

Oracle FLEXCUBE Private Banking

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

12.0.1, 12.0.2, 12.0.3, 12.1.0

CVE-2017-5638

Oracle Financial Services Analytical Applications Infrastructure

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

7.3.3, 7.3.4, 7.3.5

CVE-2017-5638

Oracle Financial Services Asset Liability Management

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Basel Regulatory Capital Basic

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.1.2, 6.1.3, 8.0.2, 8.0.3

CVE-2017-5638

Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.1.2, 6.1.3, 8.0.2, 8.0.3

CVE-2017-5638

Oracle Financial Services Data Foundation

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Data Integration Hub

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Enterprise Financial Performance Analytics

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0 to 8.0.4

CVE-2017-5638

Oracle Financial Services Funds Transfer Pricing

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Hedge Management and IFRS Valuations

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Institutional Performance Analytics

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0 to 8.0.4

CVE-2017-5638

Oracle Financial Services Liquidity Risk Management

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.1, 8.0.2, 8.0.4

CVE-2017-5638

Oracle Financial Services Loan Loss Forecasting and Provisioning

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

1.5.0, 1.5.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Pricing Management/Transfer Pricing Component

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0 to 8.0.4

CVE-2017-5638

Oracle Financial Services Profitability Management

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2017-5638

Oracle Financial Services Reconciliation Framework

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0, 8.0.1, 8.0.2

CVE-2017-5638

Oracle Financial Services Retail Customer Analytics

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0 to 8.0.3

CVE-2017-5638

Oracle Financial Services Retail Performance Analytics

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.0 to 8.0.4

CVE-2017-5638

Oracle Insurance Data Foundation

Core (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

8.0.1, 8.0.2, 8.0.3, 8.0.4

CVE-2016-0635

Oracle FLEXCUBE Private Banking

Core (Spring Framework)

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

12.0.1, 12.0.2, 12.0.3, 12.1.0

CVE-2017-3493

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Infrastructure

HTTP

No

8.5

Network

Low

Low

None

Changed

High

None

Low

12.0.0, 12.1.0

CVE-2017-3472

Oracle FLEXCUBE Private Banking

Portfolio Management

HTTP

No

8.1

Network

Low

Low

None

Un- changed

High

High

None

2.0.0, 2.0.1, 2.2.0.1, 12.0.1

CVE-2017-3476

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

7.1

Network

Low

Low

None

Un- changed

High

Low

None

2.0.0, 2.0.1, 2.2.0.1, 12.0.1

CVE-2017-3485

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

No

6.8

Network

High

Low

None

Un- changed

None

High

High

11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0

CVE-2017-3491

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Limits and Collateral

HTTP

No

6.5

Network

Low

Low

None

Un- changed

High

None

None

12.0.1, 12.1.0

CVE-2017-3488

Oracle FLEXCUBE Investor Servicing

Unit Trust

HTTP

No

6.5

Network

Low

Low

None

Un- changed

None

High

None

12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

CVE-2017-3534

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

No

6.5

Network

Low

Low

None

Un- changed

High

None

None

12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0

CVE-2017-3496

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Infrastructure

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

12.0.0, 12.1.0

CVE-2017-3492

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Infrastructure

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

12.0.0, 12.1.0

CVE-2017-3484

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Limits and Collateral

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

12.0.0, 12.1.0

CVE-2017-3489

Oracle FLEXCUBE Investor Servicing

Security Management System

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

CVE-2017-3288

Oracle FLEXCUBE Investor Servicing

Unit Trust

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

CVE-2017-3478

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

12.0.0, 12.1.0

CVE-2017-3479

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

5.4

Network

Low

Low

None

Un- changed

None

Low

Low

2.0.0, 2.0.1, 2.2.0.1, 12.0.1

CVE-2017-3482

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

No

5.4

Network

Low

Low

Required

Changed

Low

Low

None

12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0

CVE-2017-3475

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

5.0

Network

Low

Low

None

Changed

None

None

Low

2.0.0, 2.0.1, 2.2.0.1, 12.0.1

CVE-2017-3495

Oracle FLEXCUBE Direct Banking

Pre-Login

HTTP

Yes

4.7

Network

Low

None

Required

Changed

Low

None

None

12.0.2, 12.0.3

CVE-2017-3471

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

Yes

4.7

Network

Low

None

Required

Changed

None

Low

None

12.0.0, 12.1.0

CVE-2017-3480

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

Yes

4.7

Network

Low

None

Required

Changed

Low

None

None

11.3.0, 11.4.0, 12.0.1

CVE-2017-3535

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

Yes

4.7

Network

Low

None

Required

Changed

Low

None

None

11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3

CVE-2017-3494

Oracle FLEXCUBE Universal Banking

Retail Teller

HTTP

Yes

4.7

Network

Low

None

Required

Changed

Low

None

None

11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3

CVE-2017-3483

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Limits and Collateral

None

No

4.4

Local

Low

High

None

Un- changed

High

None

None

12.0.0, 12.1.0

CVE-2017-3473

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

4.3

Network

Low

Low

None

Un- changed

Low

None

None

2.0.0, 2.0.1, 2.2.0.1, 12.0.1

CVE-2017-3481

Oracle FLEXCUBE Universal Banking

Infrastructure

HTTP

No

4.3

Network

Low

Low

None

Un- changed

None

None

Low

11.3.0, 11.4.0, 12.0.1

CVE-2017-3477

Oracle FLEXCUBE Private Banking

Miscellaneous

HTTP

No

4.2

Network

High

Low

None

Un- changed

Low

Low

None

12.0.0, 12.1.0

CVE-2017-3490

Oracle FLEXCUBE Enterprise Limits and Collateral Management

Limits and Collateral

HTTP

No

3.1

Network

High

Low

None

Un- changed

Low

None

None

12.0.0, 12.1.0

CVE-2017-3487

Oracle FLEXCUBE Investor Servicing

Unit Trust

HTTP

No

3.1

Network

High

Low

None

Un- changed

None

Low

None

12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

Appendix - Oracle Health Sciences Applications****Oracle Health Sciences Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Health Sciences Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Health Sciences Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2016-3092

Oracle Healthcare Master Person Index

Cleanser, Profiler (Apache Commons FileUpload)

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

Prior to and 2.0.1.x, 3.0.0.x and 4.0.1.x

Appendix - Oracle Hospitality Applications****Oracle Hospitality Applications Executive Summary

This Critical Patch Update contains 6 new security fixes for Oracle Hospitality Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hospitality Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3574

Oracle Hospitality OPERA 5 Property Services

OPERA License code configuration

HTTP

No

7.1

Network

Low

Low

None

Un- changed

High

Low

None

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

CVE-2017-3568

Oracle Hospitality OPERA 5 Property Services

OPERA Printing and Login

None

No

6.5

Local

High

None

Required

Un- changed

High

High

Low

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

CVE-2017-3573

Oracle Hospitality OPERA 5 Property Services

OPERA Printing

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

CVE-2017-3569

Oracle Hospitality OPERA 5 Property Services

OPERA Business Events

HTTP

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

CVE-2017-3552

Oracle Hospitality OPERA 5 Property Services

OPERA Room Image/Picture Setup

HTTP

No

4.3

Network

Low

Low

None

Un- changed

Low

None

None

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

CVE-2017-3560

Oracle Hospitality OPERA 5 Property Services

OXI Interface

HTTP

No

4.3

Network

Low

Low

None

Un- changed

Low

None

None

5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

Appendix - Oracle Insurance Applications****Oracle Insurance Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Insurance Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Insurance Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2015-7940

Oracle Insurance Istream

IStream Publisher (Bouncy Castle)

HTTP

No

6.5

Network

Low

Low

None

Un- changed

High

None

None

4.3.2 and prior

Appendix - Oracle Retail Applications****Oracle Retail Applications Executive Summary

This Critical Patch Update contains 39 new security fixes for Oracle Retail Applications. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Retail Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

Oracle Retail XBRi Loss Prevention

Internal Operations (Struts 2)

HTTP

Yes

10.0

Network

Low

None

None

Changed

High

High

High

10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1

CVE-2016-0635

Oracle Retail Back Office

Security

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

14.1

CVE-2016-0635

Oracle Retail Invoice Matching

Security

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

13.2, 14.0, 14.1

CVE-2016-0635

Oracle Retail Point-of-Service

Infrastructure

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

14.1.3

CVE-2016-0635

Oracle Retail Point-of-Service

Mobile POS

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

14.1.3

CVE-2016-0635

Oracle Retail Returns Management

Security

HTTP

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

14.1

CVE-2016-3506

MICROS Lucas

Security

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

2.9.5.1, 2.9.5.2, 2.9.5.3, 2.9.5.4, 2.9.5.5

CVE-2016-3506

MICROS Relate CRM Software

Web Services

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

10.0, 10.5, 10.8, 11.0, 11.1, 11.4, 15.0

CVE-2016-3506

MICROS XBR

Database

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1

CVE-2016-3506

MICROS Xstore Payment

Security

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0

CVE-2016-3506

Oracle Retail Advanced Inventory Planning

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1, 15.0

CVE-2016-3506

Oracle Retail Advanced Science Engine

General

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1

CVE-2016-3506

Oracle Retail Analytic Parameter Calculator - RO

Data Interface

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-3506

Oracle Retail Analytic Parameter Calculator - RO

Installation/Configuration

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-3506

Oracle Retail Analytics

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.0, 14.1, 15.0, 16.0

CVE-2016-3506

Oracle Retail Assortment Planning

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.1, 16.0.0

CVE-2016-3506

Oracle Retail Category Management

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

13.2, 13.3, 14.0, 14.1

CVE-2016-3506

Oracle Retail Category Management Planning & Optimization

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-3506

Oracle Retail Customer Insights

Installer

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-2510

Oracle Retail Customer Management and Segmentation Foundation

Web Services

HTTPS

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-3506

Oracle Retail Demand Forecasting

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Item Planning

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Macro Space Optimization

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0.2

CVE-2016-3506

Oracle Retail Merchandise Financial Planning

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Merchandising Insights

Installer

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

15.0

CVE-2016-3506

Oracle Retail Order Broker

Order Broker Foundation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

5.1, 5.2, 15.0, 16.0

CVE-2016-3506

Oracle Retail Predictive Application Server

Installer - Server

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

13.1, 13.2, 13.3, 13.4, 14.0, 14.1, 15.0

CVE-2016-3506

Oracle Retail Regular Price Optimization

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Replenishment Optimization

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Size Profile Optimization

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1.3, 15.0.2

CVE-2016-3506

Oracle Retail Store Inventory

Installation

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

14.1, 15.0, 16.0

CVE-2016-3506

Oracle Retail Xstore Point of Service

Point of Sale

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

5.5, 6.0, 6.5, 7.1, 15.0

CVE-2016-3506

Oracle Retail Xstore Point of Service

Point of Sale

Oracle Net

Yes

8.1

Network

High

None

None

Un- changed

High

High

High

5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0

CVE-2016-1181

Oracle Retail Invoice Matching

Security

None

No

7.8

Local

Low

Low

None

Un- changed

High

High

High

12.0, 13.0, 13.1, 13.2, 14.0, 14.1

CVE-2017-3254

Oracle Retail Invoice Matching

Security

HTTP

Yes

7.6

Network

Low

None

Required

Un- changed

High

Low

Low

12.0, 13.0

CVE-2015-7940

Oracle Retail Open Commerce Platform

Framework

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

High

None

None

4.0, 5.0, 5.1, 5.3, 6.0

CVE-2015-0204

Oracle Retail Predictive Application Server

RPAS Server

SSL/TLS

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

13.3.3, 13.4.3, 14.0.3, 14.1.3, 15.0.2, 16.0.0

CVE-2017-3532

Oracle Retail Warehouse Management System

Security

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

13.2, 14.0, 15.0

CVE-2017-3451

Oracle Retail Open Commerce Platform

Web

HTTP

No

5.4

Network

Low

Low

Required

Changed

Low

Low

None

4.0, 5.0, 5.1, 5.3, 6.0, 6.1, 15.0, 16.0

Additional CVEs addressed are below:

  • The fix for CVE-2015-0204 also addresses CVE-2014-3571.
  • The fix for CVE-2016-1181 also addresses CVE-2014-0114, and CVE-2016-1182.
  • The fix for CVE-2017-5638 also addresses CVE-2016-4436.

Appendix - Oracle Utilities Applications****Oracle Utilities Applications Executive Summary

This Critical Patch Update contains 7 new security fixes for Oracle Utilities Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Utilities Applications Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2016-5019

Oracle Utilities Customer Self Service

Packaging (Apache Trinidad)

HTTP

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

2.1.0.2.0

CVE-2014-0114

Oracle Utilities Framework

System Wide

HTTP

Yes

8.3

Network

Low

None

None

Changed

Low

Low

Low

4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

CVE-2016-3092

Oracle Utilities Framework

File Uploads and Attachments (Apache Commons FileUpload)

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

CVE-2016-3674

Oracle Utilities Framework

UI, Batch and XAI (Xstream)

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

High

None

None

2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

CVE-2016-3092

Oracle Utilities Work and Asset Management

Integrations (Apache Commons FileUpload)

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

1.9.1.2.11

CVE-2017-3537

Oracle Real-Time Scheduler

Mobile Communications Platform

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

2.2.0.3.13, 2.3.0.0, 2.3.0.1

CVE-2012-5881

Oracle Utilities Framework

UI (YUI JavaScript framework)

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

Additional CVEs addressed are below:

  • The fix for CVE-2012-5881 also addresses CVE-2012-5882, and CVE-2012-5883.

Appendix - Oracle Primavera Products Suite****Oracle Primavera Products Suite Executive Summary

This Critical Patch Update contains 7 new security fixes for the Oracle Primavera Products Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Primavera Products Suite Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3503

Primavera P6 Enterprise Project Portfolio Management

Web Access (Apache Commons BeanUtils)

HTTP

No

9.9

Network

Low

Low

None

Changed

High

High

High

8.3, 8.4, 15.1, 15.2, 16.1, 16.2

CVE-2017-3508

Primavera Gateway

Primavera Desktop Integration

HTTP

No

9.1

Network

Low

High

None

Changed

High

High

High

1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2

CVE-2017-3500

Primavera Gateway

Primavera Desktop Integration

HTTP

No

8.7

Network

Low

High

None

Changed

High

None

High

1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2

CVE-2017-3583

Primavera P6 Enterprise Project Portfolio Management

Web Access

HTTP

Yes

8.1

Network

Low

None

Required

Un- changed

High

High

None

8.3, 8.4, 15.1, 15.2, 16.1, 16.2

CVE-2017-3579

Primavera P6 Enterprise Project Portfolio Management

Web Access

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

8.3, 8.4, 15.1, 15.2, 16.1, 16.2

CVE-2017-3501

Primavera Unifier

Platform

HTTP

Yes

6.1

Network

Low

None

Required

Changed

Low

Low

None

9.13, 9.14, 10.0, 10.1, 15.1, 15.2

CVE-2017-3732

Primavera P6 Enterprise Project Portfolio Management

Project Manager (OpenSSL)

HTTPS

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

8.3, 8.4, 15.1, 15.2, 16.1, 16.2

Additional CVEs addressed are below:

  • The fix for CVE-2017-3503 also addresses CVE-2014-0114.

Appendix - Oracle Java SE****Oracle Java SE Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Java SE. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.

Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

Oracle Java SE Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3512

Java SE

AWT

Multiple

Yes

8.3

Network

High

None

Required

Changed

High

High

High

Java SE: 7u131, 8u121

See Note 1

CVE-2017-3514

Java SE

AWT

Multiple

Yes

8.3

Network

High

None

Required

Changed

High

High

High

Java SE: 6u141, 7u131, 8u121

See Note 1

CVE-2017-3511

Java SE, Java SE Embedded, JRockit

JCE

None

No

7.7

Local

High

None

Required

Changed

High

High

High

Java SE: 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13

See Note 2

CVE-2017-3526

Java SE, Java SE Embedded, JRockit

JAXP

Multiple

Yes

5.9

Network

High

None

None

Un- changed

None

None

High

Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13

See Note 2

CVE-2017-3509

Java SE, Java SE Embedded

Networking

Multiple

Yes

4.2

Network

High

None

Required

Un- changed

Low

Low

None

Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121

See Note 1

CVE-2017-3533

Java SE, Java SE Embedded, JRockit

Networking

FTP

Yes

3.7

Network

High

None

None

Un- changed

None

Low

None

Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13

See Note 2

CVE-2017-3544

Java SE, Java SE Embedded, JRockit

Networking

SMTP

Yes

3.7

Network

High

None

None

Un- changed

None

Low

None

Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13

See Note 2

CVE-2017-3539

Java SE, Java SE Embedded

Security

Multiple

Yes

3.1

Network

High

None

Required

Un- changed

None

Low

None

Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121

See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Appendix - Oracle Sun Systems Products Suite****Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 21 new security fixes for the Oracle Sun Systems Products Suite. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3623

Solaris

Kernel RPC

Multiple

Yes

10.0

Network

Low

None

None

Changed

High

High

High

None

See Note 1

CVE-2016-3607

Solaris Cluster

GlassFish Server

Multiple

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

4.3

CVE-2016-5019

StorageTek Tape Analytics SW Tool

Core (Apache Trinidad)

Multiple

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

Prior to 2.2.1

CVE-2015-4852

StorageTek Tape Analytics SW Tool

WebLogic Server

T3

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

Prior to 2.2.1

CVE-2015-7501

StorageTek Tape Analytics SW Tool

Core (Apache Commons Collections)

Multiple

No

8.8

Network

Low

Low

None

Un- changed

High

High

High

Prior to 2.2.1

CVE-2017-3578

Sun ZFS Storage Appliance Kit (AK)

RAS subsystems

None

No

8.8

Local

Low

Low

None

Changed

High

High

High

AK 2013

CVE-2017-3582

Oracle SuperCluster Specific Software

Backup/Restore Utility

None

No

8.4

Local

Low

None

None

Un- changed

High

High

High

2.3.8, 2.3.13

CVE-2017-3580

Sun ZFS Storage Appliance Kit (AK)

RAS subsystems

Multiple

Yes

8.3

Network

High

None

Required

Changed

High

High

High

AK 2013

CVE-2017-3564

Solaris

RBAC

None

No

8.2

Local

Low

Low

Required

Changed

High

High

High

11.3

CVE-2017-3565

Solaris

RBAC

None

No

7.9

Local

Low

Low

Required

Changed

High

High

None

11.3

CVE-2017-3622

Solaris

Common Desktop Environment (CDE)

None

No

7.8

Local

Low

Low

None

Un- changed

High

High

High

10

See Note 2

CVE-2017-3584

Sun ZFS Storage Appliance Kit (AK)

RAS subsystems

None

No

7.8

Local

High

Low

None

Changed

High

High

High

AK 2013

CVE-2017-3510

Solaris

Kernel Zones virtualized NIC driver

Multiple

No

7.7

Network

Low

Low

None

Changed

None

High

None

11.3

CVE-2017-3516

Solaris

Kernel Zones virtualized NIC driver

Multiple

No

7.7

Network

Low

Low

None

Changed

None

None

High

11.3

CVE-2017-3621

Sun ZFS Storage Appliance Kit (AK)

IPC Frameworks

Multiple

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

AK 2013

CVE-2017-3497

Solaris

Remote Administration Daemon

Multiple

Yes

7.3

Network

Low

None

None

Un- changed

Low

Low

Low

11.3

CVE-2017-3551

Solaris

Smartcard Libraries

None

No

6.6

Local

Low

Low

None

Un- changed

Low

Low

High

11.3

CVE-2017-3585

Sun ZFS Storage Appliance Kit (AK)

User Interface subsystem

HTTP

Yes

5.3

Network

Low

None

None

Un- changed

None

Low

None

AK 2013

CVE-2017-3498

Solaris

Kernel

None

No

3.3

Local

Low

Low

None

Un- changed

Low

None

None

11.3

CVE-2017-3474

Solaris

Zone

None

No

3.3

Local

Low

Low

None

Un- changed

Low

None

None

11.3

CVE-2016-5551

Solaris Cluster

NAS device addition

None

No

3.3

Local

Low

None

Required

Un- changed

Low

None

None

4.3

Notes:

  1. CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue.
  2. CVE-2017-3622 is assigned for the "Extremeparr".

Additional CVEs addressed are below:

  • The fix for CVE-2016-5019 also addresses CVE-2016-3504.

Appendix - Oracle Linux and Virtualization****Oracle Virtualization Executive Summary

This Critical Patch Update contains 15 new security fixes for Oracle Virtualization. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Virtualization Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2016-5407

Secure Global Desktop

Window System (X11)

TCP

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

4.71, 5.2, 5.3

CVE-2017-3561

Oracle VM VirtualBox

Core

None

No

8.8

Local

Low

Low

None

Changed

High

High

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3563

Oracle VM VirtualBox

Core

None

No

8.8

Local

Low

Low

None

Changed

High

High

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3576

Oracle VM VirtualBox

Core

None

No

8.8

Local

Low

Low

None

Changed

High

High

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3558

Oracle VM VirtualBox

Core

None

No

8.5

Local

Low

None

None

Changed

Low

Low

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3587

Oracle VM VirtualBox

Shared Folder

None

No

8.4

Local

Low

Low

None

Changed

None

High

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3559

Oracle VM VirtualBox

Core

None

No

7.9

Local

Low

Low

None

Changed

Low

Low

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3575

Oracle VM VirtualBox

Core

None

No

7.9

Local

Low

High

None

Changed

None

High

High

Prior to 5.0.38, Prior to 5.1.20

CVE-2017-3538

Oracle VM VirtualBox

Shared Folder

None

No

7.5

Local

High

Low

None

Changed

High

High

None

Prior to 5.0.34, Prior to 5.1.16

CVE-2017-3731

Secure Global Desktop

Core (OpenSSL)

SSL/TLS

Yes

5.9

Network

High

None

None

Un- changed

None

None

High

4.71, 5.2, 5.3

CVE-2013-1982

Secure Global Desktop

Window System (X11)

TCP

Yes

5.6

Network

High

None

None

Un- changed

Low

Low

Low

4.71

CVE-2016-3739

Secure Global Desktop

Core (LibcURL)

Multiple

Yes

4.8

Network

High

None

None

Un- changed

Low

Low

None

5.2, 5.3

CVE-2016-8743

Secure Global Desktop

Web Server (Apache HTTP Server)

HTTP

Yes

4.0

Network

High

None

None

Changed

Low

None

None

4.71, 5.2, 5.3

CVE-2016-0762

Secure Global Desktop

Application Server (Apache Tomcat)

HTTP

Yes

3.7

Network

High

None

None

Un- changed

Low

None

None

4.71, 5.2, 5.3

CVE-2017-3513

Oracle VM VirtualBox

Core

None

No

2.5

Local

High

High

None

Changed

Low

None

None

Prior to 5.0.38, Prior to 5.1.20

Additional CVEs addressed are below:

  • The fix for CVE-2013-1982 also addresses CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987, CVE-2013-1995, CVE-2013-1998, CVE-2013-2002, CVE-2013-2003, and CVE-2013-2005.
  • The fix for CVE-2016-0762 also addresses CVE-2016-5018, CVE-2016-6794, CVE-2016-6796, CVE-2016-6797, CVE-2016-6816, CVE-2016-6817, and CVE-2016-8735.
  • The fix for CVE-2016-3739 also addresses CVE-2016-4802, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, and CVE-2016-8625.
  • The fix for CVE-2017-3731 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-7055, CVE-2017-3730, and CVE-2017-3732.

Appendix - Oracle MySQL****Oracle MySQL Executive Summary

This Critical Patch Update contains 40 new security fixes for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle MySQL Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-5638

MySQL Enterprise Monitor

Monitoring: General (Struts 2)

MySQL Protocol

Yes

10.0

Network

Low

None

None

Changed

High

High

High

3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier,

CVE-2016-6303

MySQL Workbench

Workbench: Security: Encryption (OpenSSL)

MySQL Protocol

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

6.3.8 and earlier

CVE-2017-3523

MySQL Connectors

Connector/J

MySQL Protocol

No

8.5

Network

High

Low

None

Changed

High

High

High

5.1.40 and eariler

CVE-2017-3306

MySQL Enterprise Monitor

Monitoring: Server

MySQL Protocol

No

8.3

Network

Low

High

Required

Changed

High

High

Low

3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier

CVE-2016-2176

MySQL Enterprise Backup

Backup: ENTRBACK (OpenSSL)

MySQL Protocol

Yes

8.2

Network

Low

None

None

Un- changed

Low

None

High

3.12.2 and earlier, 4.0.1 and earlier

CVE-2016-2176

MySQL Workbench

Workbench: Security: Encryption (OpenSSL)

MySQL Protocol

Yes

8.2

Network

Low

None

None

Un- changed

Low

None

High

6.3.7 and earlier

CVE-2017-3308

MySQL Server

Server: DML

MySQL Protocol

No

7.7

Network

Low

Low

None

Changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3309

MySQL Server

Server: Optimizer

MySQL Protocol

No

7.7

Network

Low

Low

None

Changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3450

MySQL Server

Server: Memcached

MySQL Protocol

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3599

MySQL Server

Server: Pluggable Auth

MySQL Protocol

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3329

MySQL Server

Server: Thread Pooling

MySQL Protocol

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3600

MySQL Server

Client mysqldump

MySQL Protocol

No

6.6

Network

High

High

None

Un- changed

High

High

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

See Note 1

CVE-2016-3092

MySQL Enterprise Monitor

Monitoring: General (Apache Commons FileUpload)

MySQL Protocol

No

6.5

Network

Low

Low

None

Un- changed

None

None

High

3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier

CVE-2017-3331

MySQL Server

Server: DML

MySQL Protocol

No

6.5

Network

Low

Low

None

Un- changed

None

None

High

5.7.11 to 5.7.17

CVE-2017-3453

MySQL Server

Server: Optimizer

MySQL Protocol

No

6.5

Network

Low

Low

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3452

MySQL Server

Server: Optimizer

MySQL Protocol

No

6.5

Network

Low

Low

None

Un- changed

None

None

High

5.6.35 and earlier

CVE-2017-3586

MySQL Connectors

Connector/J

MySQL Protocol

No

6.4

Network

Low

Low

None

Changed

Low

Low

None

5.1.41 and earlier

CVE-2017-3732

MySQL Enterprise Backup

Backup: ENTRBACK (OpenSSL)

MySQL Protocol

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

3.12.3 and earlier, 4.0.3 and earlier

CVE-2017-3731

MySQL Enterprise Monitor

Monitoring: General (OpenSSL)

MySQL Protocol

Yes

5.9

Network

High

None

None

Un- changed

High

None

None

3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier

CVE-2017-3454

MySQL Server

Server: InnoDB

MySQL Protocol

No

5.5

Network

Low

High

None

Un- changed

None

Low

High

5.7.17 and earlier

CVE-2017-3304

MySQL Cluster

Cluster: DD

MySQL Protocol

No

5.4

Network

Low

Low

None

Un- changed

None

Low

Low

7.2.27 and earlier, 7.3.16 and earlier, 7.4.14 and earlier, 7.5.5 and earlier

CVE-2017-3455

MySQL Server

Server: Security: Privileges

MySQL Protocol

No

5.4

Network

Low

Low

None

Un- changed

Low

Low

None

5.7.17 and earlier

CVE-2017-3305

MySQL Server

Server: C API

MySQL Protocol

No

5.3

Network

High

Low

None

Un- changed

High

None

None

5.5.55 and earlier, 5.6.35 and earlier

CVE-2017-3302

MySQL Server

Server: C API

MySQL Protocol

No

5.1

Local

High

None

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.20 and earlier

CVE-2017-3460

MySQL Server

Server: Audit Plug-in

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.7.17 and earlier

CVE-2017-3456

MySQL Server

Server: DML

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3458

MySQL Server

Server: DML

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.7.17 and earlier

CVE-2017-3457

MySQL Server

Server: DML

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.7.17 and earlier

CVE-2017-3459

MySQL Server

Server: Optimizer

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.7.17 and earlier

CVE-2017-3463

MySQL Server

Server: Security: Privileges

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3462

MySQL Server

Server: Security: Privileges

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3461

MySQL Server

Server: Security: Privileges

MySQL Protocol

No

4.9

Network

Low

High

None

Un- changed

None

None

High

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3464

MySQL Server

Server: DDL

MySQL Protocol

No

4.3

Network

Low

Low

None

Un- changed

None

Low

None

5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier

CVE-2017-3465

MySQL Server

Server: Security: Privileges

MySQL Protocol

No

4.3

Network

Low

Low

None

Un- changed

None

Low

None

5.7.17 and earlier

CVE-2017-3467

MySQL Server

Server: C API

MySQL Protocol

Yes

3.7

Network

High

None

None

Un- changed

Low

None

None

5.7.17 and earlier

CVE-2017-3469

MySQL Workbench

Workbench: Security : Encryption

MySQL Protocol

Yes

3.7

Network

High

None

None

Un- changed

Low

None

None

6.3.8 and earlier

CVE-2017-3589

MySQL Connectors

Connector/J

MySQL Protocol

No

3.3

Local

Low

Low

None

Un- changed

None

Low

None

5.1.41 and earlier

CVE-2017-3590

MySQL Connectors

Connector/Python

None

No

3.3

Local

Low

Low

None

Un- changed

None

Low

None

2.1.5 and earlier

CVE-2017-3307

MySQL Enterprise Monitor

Monitoring: Server

MySQL Protocol

No

3.1

Network

High

High

Required

Un- changed

None

Low

Low

3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier

CVE-2017-3468

MySQL Server

Server: Security: Encryption

MySQL Protocol

No

3.1

Network

High

Low

None

Un- changed

None

Low

None

5.7.17 and earlier

Notes:

  1. CVE-2017-3600 is equivalent to CVE-2016-5483.

Additional CVEs addressed are below:

  • The fix for CVE-2016-2176 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-2109.
  • The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, and CVE-2016-6306.
  • The fix for CVE-2017-3731 also addresses CVE-2016-7055, and CVE-2017-3732.
  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, and CVE-2017-3731.

Appendix - Oracle Support Tools****Oracle Support Tools Executive Summary

This Critical Patch Update contains 13 new security fixes for Oracle Support Tools. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Support Tools Risk Matrix

CVE#

Component

Sub-component

Protocol

Remote Exploit without Auth.?

CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)

Supported Versions Affected

Notes

Base Score

Attack Vector

Attack Complex

Privs Req’d

User Interact

Scope

Confid­entiality

Inte­grity

Avail­ability

CVE-2017-3234

Automatic Service Request (ASR)

ASR Manager

SFT

Yes

9.8

Network

Low

None

None

Un- changed

High

High

High

Prior to 5.7

CVE-2017-3237

Automatic Service Request (ASR)

ASR Manager

None

No

7.8

Local

Low

Low

None

Un- changed

High

High

High

Prior to 5.7

CVE-2017-3581

Automatic Service Request (ASR)

ASR Manager

None

No

7.8

Local

Low

Low

None

Un- changed

High

High

High

Prior to 5.7

CVE-2017-3620

Automatic Service Request (ASR)

ASR Manager

None

No

7.8

Local

Low

Low

None

Un- changed

High

High

High

Prior to 5.7

CVE-2017-3233

Automatic Service Request (ASR)

ASR Manager

HTTP

Yes

7.5

Network

Low

None

None

Un- changed

None

High

None

Prior to 5.7

CVE-2016-6304

OSS Support Tools

Oracle Explorer (OpenSSL)

SSL/TLS

Yes

7.5

Network

Low

None

None

Un- changed

None

None

High

Prior to RDA 8.15.17.3.14

CVE-2015-5252

Oracle Advanced Support Gateway

Samba Service

SMB

Yes

7.2

Network

Low

None

None

Changed

Low

Low

None

Prior to 7.2

CVE-2017-3618

Automatic Service Request (ASR)

ASR Manager

None

No

7.1

Local

Low

Low

None

Un- changed

High

High

None

Prior to 5.7

CVE-2017-3232

Automatic Service Request (ASR)

ASR Manager

None

No

5.5

Local

Low

Low

None

Un- changed

High

None

None

Prior to 5.7

CVE-2017-3619

Automatic Service Request (ASR)

ASR Manager

None

No

5.5

Local

Low

Low

None

Un- changed

High

None

None

Prior to 5.7

CVE-2017-3504

Automatic Service Request (ASR)

ASR Manager

None

No

5.1

Local

Low

None

None

Un- changed

None

Low

Low

Prior to 5.7

CVE-2017-3505

Automatic Service Request (ASR)

ASR Manager

None

No

5.1

Local

Low

None

None

Un- changed

None

Low

Low

Prior to 5.7

CVE-2004-2761

Oracle Trace File Analyzer (TFA)

TFA Collector

Multiple

No

4.3

Network

Low

Low

None

Un- changed

None

Low

None

Prior to 12.1.2.8.4

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Why Oracle

  • Analyst Reports
  • Gartner MQ for Cloud ERP
  • Cloud Economics
  • Corporate Responsibility
  • Diversity and Inclusion
  • Security Practices

Learn

  • What is cloud computing?
  • What is CRM?
  • What is Docker?
  • What is Kubernetes?
  • What is Python?
  • What is SaaS?

What’s New

  • News

  • Oracle CloudWorld

  • Oracle Supports Ukraine

  • Oracle Red Bull Racing

  • Oracle Sustainability

  • Employee Experience Platform

  • © 2022 Oracle

  • Site Map

  • Privacy/Do Not Sell My Info

  • Ad Choices

  • Careers

  • Facebook

  • Twitter

  • LinkedIn

  • YouTube

Related news

Ubuntu Security Notice USN-6978-1

Ubuntu Security Notice 6978-1 - It was discovered that XStream incorrectly handled parsing of certain crafted XML documents. A remote attacker could possibly use this issue to read arbitrary files. Zhihong Tian and Hui Lu found that XStream was vulnerable to remote code execution. A remote attacker could run arbitrary shell commands by manipulating the processed input stream. It was discovered that XStream was vulnerable to server-side forgery attacks. A remote attacker could request data from internal resources that are not publicly available only by manipulating the processed input stream.

Ubuntu Security Notice USN-6936-1

Ubuntu Security Notice 6936-1 - It was discovered that Apache Commons Collections allowed serialization support for unsafe classes by default. A remote attacker could possibly use this issue to execute arbitrary code.

8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining

Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8220 Gang by exploiting known security flaws in the Oracle WebLogic Server. "The threat actor employs fileless execution techniques, using DLL reflective and process injection, allowing the malware code to run solely in memory and avoid disk-based detection mechanisms," Trend Micro researchers Ahmed

8220 Gang Targets Telecom and Healthcare in Global Cryptojacking Attack

By Deeba Ahmed The 8220 gang, believed to be of Chinese origins, was first identified in 2017 by Cisco Talos when they targeted Drupal, Hadoop YARN, and Apache Struts2 applications for propagating cryptojacking malware. This is a post from HackRead.com Read the original post: 8220 Gang Targets Telecom and Healthcare in Global Cryptojacking Attack

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread Malware

The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware. The security shortcoming is CVE-2020-14883 (CVSS score: 7.2), a remote code execution bug that could be exploited by authenticated attackers to take over susceptible servers. "This vulnerability allows remote authenticated

New ‘NKAbuse’ Linux Malware Uses Blockchain Technology to Spread

By Deeba Ahmed The malware, dubbed NKAbuse, uses New Kind of Network (NKN) technology, a blockchain-powered peer-to-peer network protocol to spread its infection. This is a post from HackRead.com Read the original post: New ‘NKAbuse’ Linux Malware Uses Blockchain Technology to Spread

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for New Kind of Network) as a communications channel. "The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities," Russian

New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now

Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web application framework that could result in remote code execution. Tracked as CVE-2023-50164, the vulnerability is rooted in a flawed "file upload logic" that could enable unauthorized path traversal and could be exploited under the circumstances to upload a malicious file

Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers

A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware. SecureWorks Counter Threat Unit (CTU) has dubbed the e-crime group Gold Melody, which is also known by the names Prophet Spider (CrowdStrike) and UNC961 (Mandiant). "This financially motivated

CVE-2023-28864: Chef Infra Server Release Notes

Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.

CVE-2022-33159: Security Bulletin: IBM Security Directory Suite is vulnerable to multiple issues

IBM Security Directory Suite VA 8.0.1 through 8.0.1.19 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 228567.

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency

The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware. The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could allow an unauthenticated attacker to execute arbitrary commands

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites

The total number of 61,000 open vulnerabilities, including 1,700 critical ones that have been open for 180+ days, exposes businesses to potential attacks.

OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities

The OpenSSL project has rolled out fixes to contain two high-severity flaws in its widely used cryptography library that could result in a denial-of-service (DoS) and remote code execution. The issues, tracked as CVE-2022-3602 and CVE-2022-3786, have been described as buffer overrun vulnerabilities that can be triggered during X.509 certificate verification by supplying a specially-crafted email

Critical OpenSSL fix due Nov 1—what you need to know

Categories: News Tags: fix Tags: bug Tags: vulnerability Tags: exploit Tags: attack Tags: patch Tags: update Tags: OpenSSL Tags: v3 Tags: v1 Tags: 3.0.5. Version 3.0.7 of OpenSSL will fix the software's first critical issue for six years. (Read more...) The post Critical OpenSSL fix due Nov 1—what you need to know appeared first on Malwarebytes Labs.

CVE-2022-39237: Digital Signature Hash Algorithms Not Validated

syslabs/sif is the Singularity Image Format (SIF) reference implementation. In versions prior to 2.8.1the `github.com/sylabs/sif/v2/pkg/integrity` package did not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade. Users unable to upgrade may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure.

CVE-2012-2160: Fix List for Rational Change

IBM Rational Change 5.3 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using the SUPP_TEMPLATE_FLAG parameter in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2022-26482: Security Center

An issue was discovered in Poly EagleEye Director II before 2.2.2.1. os.system command injection can be achieved by an admin.

CVE-2022-32294: Zimbra Security Advisories - Zimbra :: Tech Center

Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port).

CVE-2022-32294: Zimbra Security Advisories - Zimbra :: Tech Center

Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port).

CVE-2022-32294: Zimbra Security Advisories - Zimbra :: Tech Center

Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port).

CVE-2022-32294: Zimbra Security Advisories - Zimbra :: Tech Center

Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port).

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

CVE-2022-32535: Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch.

Ubuntu Security Notice USN-5449-1

Ubuntu Security Notice 5449-1 - It was discovered that libXv incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-29855: Security Advisories

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.

CVE-2022-22721: Apache HTTP Server 2.4 vulnerabilities

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2022-24052: Security Vulnerabilities Fixed in MariaDB

MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.

CVE-2021-44790: Apache HTTP Server 2.4 vulnerabilities

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-35576: Oracle Critical Patch Update Advisory - October 2021

Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise Oracle Database Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).

CVE-2021-2369: Oracle Critical Patch Update Advisory - July 2021

Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically i...

CVE-2021-21341: XStream - Change History

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.

CVE-2020-14829: Oracle Critical Patch Update Advisory - October 2020

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVE-2020-14829: Oracle Critical Patch Update Advisory - October 2020

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVE-2020-14829: Oracle Critical Patch Update Advisory - October 2020

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVE-2020-9490: Apache HTTP Server 2.4 vulnerabilities

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2978: Oracle Critical Patch Update Advisory - July 2020

Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role account privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition. While the vulnerability is in Oracle Database - Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition accessible data. CVSS 3.1 Base Score 4.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

CVE-2020-2956: Oracle Critical Patch Update Advisory - April 2020

Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVE-2020-2956: Oracle Critical Patch Update Advisory - April 2020

Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVE-2020-2956: Oracle Critical Patch Update Advisory - April 2020

Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVE-2020-2956: Oracle Critical Patch Update Advisory - April 2020

Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2020-2548: Oracle Critical Patch Update Advisory - January 2020

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

CVE-2019-2999: Oracle Critical Patch Update Advisory - October 2019

Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Ja...

CVE-2019-2808: Oracle Critical Patch Update Advisory - July 2019

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVE-2019-4136: Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controller

IBM Cognos Controller 10.2.0, 10.2.1, 10.3.0, 10.3.1, and 10.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158332.

CVE-2019-2628: Oracle Critical Patch Update Advisory - April 2019

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVE-2019-2455: Oracle Critical Patch Update Advisory - January 2019

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

CVE-2018-3133: Oracle Critical Patch Update - October 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-3064: CPU July 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

CVE-2018-2755: Oracle Critical Patch Update - April 2018

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

CVE-2018-2637: Oracle Critical Patch Update - January 2018

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/A...

CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the l...

CVE-2017-10378: Oracle Critical Patch Update - October 2017

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

CVE-2016-6817

The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.

CVE-2016-6797

The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.

CVE-2016-0762

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

CVE-2016-5018

In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.

CVE-2016-6794

When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.

CVE-2017-3636: Oracle Critical Patch Update Advisory - July 2017

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients ...

CVE-2016-8735: Apache Tomcat® - Apache Tomcat 9 vulnerabilities

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.

CVE-2016-6816: Apache Tomcat® - Apache Tomcat 9 vulnerabilities

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVE-2017-3238: Oracle Critical Patch Update Advisory - January 2017

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).

CVE-2016-5612: Oracle Critical Patch Update - October 2016

Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.

CVE-2016-6304

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.

CVE-2016-7052

crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.

CVE-2016-6308

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.

CVE-2016-6303: Invalid Bug ID

Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.

CVE-2016-2183: Invalid Bug ID

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVE-2016-5771: PHP: PHP 5 ChangeLog

spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3471: Oracle Critical Patch Update - July 2016

Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.

CVE-2016-3092: Invalid Bug ID

The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.

CVE-2016-2178

The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.

CVE-2016-4343: PHP: PHP 7 ChangeLog

The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.

CVE-2016-2105

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

CVE-2016-2107

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

CVE-2016-0642: Oracle Critical Patch Update Advisory - April 2016

Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.

CVE-2016-0763

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.

CVE-2016-0714

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.

CVE-2016-0706

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.

CVE-2015-5351

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

CVE-2016-0502: Oracle Critical Patch Update - January 2016

Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.

CVE-2015-5252

vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.

CVE-2015-4879: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-4734: Oracle Critical Patch Update Advisory - October 2015

Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.

CVE-2015-2590: Oracle Critical Patch Update Advisory - July 2015

Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.

CVE-2015-2590: Oracle Critical Patch Update Advisory - July 2015

Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.

CVE-2015-2590: Oracle Critical Patch Update Advisory - July 2015

Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.

CVE-2015-2582: Oracle Critical Patch Update Advisory - July 2015

Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.

CVE-2015-0501: Oracle Critical Patch Update - April 2015

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.

CVE-2015-0480: Oracle Critical Patch Update - April 2015

Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.

CVE-2015-0480: Oracle Critical Patch Update - April 2015

Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.

CVE-2015-0395: Oracle Critical Patch Update Advisory - January 2015

Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.

CVE-2015-0391: Oracle Critical Patch Update Advisory - January 2015

Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.

CVE-2014-6469: Oracle Critical Patch Update - October 2014

Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.

CVE-2014-4288: Oracle Critical Patch Update - October 2014

Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532.

CVE-2014-4260: Oracle Critical Patch Update - July 2014

Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.

CVE-2014-4265: Oracle Critical Patch Update - July 2014

Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment.

CVE-2014-3479: PHP: PHP 5 ChangeLog

The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.

CVE-2012-0053: Apache HTTP Server 2.2 vulnerabilities

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.

CVE-2011-2729: Apache Tomcat® - Apache Tomcat 7 vulnerabilities

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907