I prodotti Oracle sotto descritti sono affetti da alcune vulnerabilità, quali esecuzione remota di codice arbitrario, divulgazione di informazioni dovute allo sfruttamento delle vulnerabilità, denial of service.
Prodotti affetti dalle Vulnerabilità:
- Oracle Database 11g, version 11.1.0.7
- Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4
- Oracle Database 10g, version 10.1.0.5
- Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV
- Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0, 10.1.3.5.0
- Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0
- Oracle Business Intelligence Enterprise Edition, versions 10.1.3.4.0, 10.1.3.4.1
- Oracle E-Business Suite Release 12, versions 12.0.6, 12.1
- Oracle E-Business Suite Release 11i, version 11.5.10.2
- AutoVue, version 19.3
- Agile Engineering Data Management (EDM), version 6.1
- PeopleSoft PeopleTools & Enterprise Portal, version 8.49
- PeopleSoft Enterprise HCM (TAM), versions 8.9 and 9.0
- JDEdward Tools, version 8.98
- Oracle WebLogic Server 10.0 through MP1 and 10.3
- Oracle WebLogic Server 9.0 GA, 9.1 GA and 9.2 through 9.2 MP3
- Oracle WebLogic Server 8.1 through 8.1 SP5
- Oracle WebLogic Server 7.0 through 7.0 SP6
- Oracle WebLogic Portal, versions 8.1 through 8.1 SP6, 9.2 through 9.2 MP3, 10.0 through 10.0MP1, 10.2 through 10.2MP1 and 10.3 through 10.3.1
- Oracle JRockit R27.6.4 and earlier (JDK/JRE 6, 5, 1.4.2)
- Oracle Communications Order and Service Management, versions 2.8.0, 6.2.0, 6.3.0 and 6.3.1
Soluzione:
Applicare le correzioni appropriate oppure aggiornare come specificato in Oracle Critical Patch Update Advisory – October 2009 per correggere queste nuove vulnerabilità.
Riferimenti utili:
- Oracle Critical Patch Update Advisory – October 2009 – <http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html>
- Critical Patch Updates and Security Alerts – <http://www.oracle.com/technology/deploy/security/alerts.htm>
- Map of Public Vulnerability to Advisory/Alert – <http://www.oracle.com/technology/deploy/security/critical-patch-updates/public_vuln_to_advisory_mapping.html>