Sunday , 25 March 2018
Home >> S >> Security >> Oracle drops 299-patch confidence update

Oracle drops 299-patch confidence update

Oracle has forsaken a large 299-patch confidence refurbish overnight to repair a slew of vulnerabilities opposite a far-reaching operation of a company’s software. And 25 of a rags are dictated to repair confidence flaws rated during 10 out of 10 for criticality by a Common Vulnerability Scoring System (CVSS).

The array of rags breaks a company’s prior record recover – a small 276 in Jul 2016 – though reflects a expansion in a series of vulnerabilities that Oracle is being forced to patch: adult from usually 78 in Jan 2012, to some-more than 250 per entertain over a past year.

Furthermore, on a rags for 25 vulnerabilities rated 10 out of 10 by CVSS, a serve 15 were rated critical. 

Forty-seven of a rags are dictated to repair financial services applications, while 39 are dictated to repair vulnerabilities in a widely used open-source database MySQL. 

One of a fixes for a Solaris handling complement was highlighted by a new Shadow Brokers recover of hacking collection related to a US National Security Agency

A sum of 39 are dictated to repair vulnerabilities in sell applications, fixes that might go behind to last year’s vicious crack of a company’s MICROS sell systems unit – and Oracle isn’t a usually sell systems businessman that has been targeted

Moreover, a recover includes rags to repair vulnerabilities opposite a whole operation of Oracle craving apparatus formulation (ERP) program applications – PeopleSoft, E-Business Suite, JD Edwards, Siebel CRM, Oracle Financial Services, and Oracle Primavera Products Suite, with roughly two-thirds of them exploitable remotely but a requirement for credentials.

“Oracle’s vicious patch refurbish for Apr 2017 is characterised by a record-setting series of fixes addressing straight applications. Security issues in Financial Services, Retail, Communications, Utilities, Hospitality, Health Sciences, and Insurance applications sum 122 and comment for 37% of all patches. Moreover, 61% (75) of them are exploitable remotely,” warned ERP program confidence specialists ERPScan.

It also highlighted some of a many vicious of a vicious vulnerabilities that a patch-drop should fix:

  • Easily exploitable disadvantage in a Solaris member of Oracle Sun Systems Products Suite, that enables an unauthenticated assailant with network entrance around mixed protocols to concede Solaris. While a disadvantage is in Solaris, attacks might significantly impact additional products. Successful attacks of this disadvantage can outcome in takeover of servers using Solaris. This is believed to be a smirch exploited by a hacking apparatus expelled by Shadow Brokers progressing this month;


  • Easily exploitable disadvantage in a MySQL Enterprise Monitor member of Oracle MySQL that allows an unauthenticated assailant with network entrance around mixed protocols to concede MySQL Enterprise Monitor. While a disadvantage is in MySQL Enterprise Monitor, attacks might significantly impact other products;


  • Easily exploitable disadvantage in Oracle Financial Services Data Integration Hub that allows an unauthenticated assailant with network entrance around HTTP to concede a program and can outcome in a takeover.

ERPScan also highlighted 10-out-of-10-rated vulnerabilities in Oracle’s Flexcube Private Banking software.

Organisations need to patch their craving systems as a matter of priority, warned ERPScan arch record officer Alexander Polyakov, as they are increasingly regarded as some-more remunerative targets for a many worldly cyber crime gangs than individuals.

“Nowadays, hackers set their eyes on enterprises some-more than on individuals, as they know that they are some-more essential targets. Taking into comment that Oracle’s products are commissioned in a largest enterprises, these applications can be their ultimate target.

“The good news is that a businessman drew courtesy to this vicious area before a vicious information crack happened. The bad news is that Oracle admins will have a lot of work to do installing countless patches.”  

Computing Cybersecurity Strategy Briefing for a Financial Sector logo

Join Computing in London on 4 May for the Cyber Security Strategy Briefing 2017 for a Financial Sector. 

Speakers embody Adam Koleda, IT executive of word organisation BPL Global; Peter Agathangelou, associate executive of Hamilton Fraser Insurance; and, Dr Kuan Hon, consultant counsel during law organisation Pinsent Masons

Attendance is free to subordinate IT professionals and IT leaders – register now!

Further reading



  • <!–

  • Save this article

  • –>

==[ Click Here 1X ] [ Close ]==