Security Activity Bulletin

Oracle Critical Patch Update July 2012

 
Threat Type:IntelliShield: Security Activity Bulletin
IntelliShield ID:26420
Version:3
First Published:2012 July 18 10:40 GMT
Last Published:2012 November 15 15:04 GMT
Port: Not available
CVE:CVE-2001-0323 , CVE-2011-3562 , CVE-2012-0540 , CVE-2012-0563 , CVE-2012-1687 , CVE-2012-1689 , CVE-2012-1715 , CVE-2012-1720 , CVE-2012-1727 , CVE-2012-1728 , CVE-2012-1729 , CVE-2012-1730 , CVE-2012-1731 , CVE-2012-1732 , CVE-2012-1733 , CVE-2012-1734 , CVE-2012-1735 , CVE-2012-1736 , CVE-2012-1737 , CVE-2012-1738 , CVE-2012-1739 , CVE-2012-1740 , CVE-2012-1741 , CVE-2012-1742 , CVE-2012-1743 , CVE-2012-1744 , CVE-2012-1745 , CVE-2012-1746 , CVE-2012-1747 , CVE-2012-1748 , CVE-2012-1749 , CVE-2012-1750 , CVE-2012-1752 , CVE-2012-1753 , CVE-2012-1754 , CVE-2012-1756 , CVE-2012-1757 , CVE-2012-1758 , CVE-2012-1759 , CVE-2012-1760 , CVE-2012-1761 , CVE-2012-1762 , CVE-2012-1764 , CVE-2012-1765 , CVE-2012-1766 , CVE-2012-1767 , CVE-2012-1768 , CVE-2012-1769 , CVE-2012-1770 , CVE-2012-1771 , CVE-2012-1772 , CVE-2012-1773 , CVE-2012-3106 , CVE-2012-3107 , CVE-2012-3108 , CVE-2012-3109 , CVE-2012-3110 , CVE-2012-3111 , CVE-2012-3112 , CVE-2012-3113 , CVE-2012-3114 , CVE-2012-3115 , CVE-2012-3116 , CVE-2012-3117 , CVE-2012-3118 , CVE-2012-3119 , CVE-2012-3120 , CVE-2012-3121 , CVE-2012-3122 , CVE-2012-3123 , CVE-2012-3124 , CVE-2012-3125 , CVE-2012-3126 , CVE-2012-3127 , CVE-2012-3128 , CVE-2012-3129 , CVE-2012-3130 , CVE-2012-3131 , CVE-2012-3134 , CVE-2012-3135
Urgency:Possible use
Credibility:Confirmed
Severity:Moderate Damage
 
Version Summary:Red Hat has released a security advisory and updated packages to address the Oracle Critical Patch Update for July 2012. CentOS has also released updated packages to address these vulnerabilities.
 

Description
 
Oracle has released the July 2012 Critical Patch Update. As part of the security response, Oracle has released updates to correct 90 vulnerabilities in multiple products that could allow attackers to gain unauthorized access to targeted systems, access sensitive information, or cause a denial of service (DoS) condition.

The following Oracle products are affected:
  • Oracle Application Server 10g 10.1.3.1.5 and prior
  • Oracle Database Server 10g 1.2.0.5 and prior
  • Oracle Database Server 11g 11.1.0.7 and prior and 11.2.0.3 and prior
  • Oracle E-Business Suite 11.5.10.2, 12.0.4, 120.6, and 12.1.3 and prior
  • Oracle Enterprise Manager Grid Control 10g 10.2.0.5 and prior
  • Oracle Fusion Middleware 11.1.1.6 and prior
  • Oracle Hyperion Performance Suite 11.1.2 and prior
  • Oracle Identity Management 10g 10.1.4.3
  • Oracle Outside In Technology 8.3.5 and 8.3.7
  • Oracle Secure Backup 10.3.0.3 and prior and 10.4.1 and prior
  • Oracle Siebel Customer Relationship Management (CRM) 8.1.1 and 8.2.2
  • Oracle Transportation Manager 5.5.06, 6.0.03, 6.1, and 6.2
  • PeopleSoft Enterprise HRMS 9.0 and 9.1
  • PeopleSoft Enterprise PeopleTools 8.50, 8.51, and 8.52
  • Oracle Enterprise Manager Grid Control 11g 11.1.0.7
  • Oracle AutoVue 20.0.1 and 20.0.2
  • Oracle Clinical 4.6.3 and prior

Proof-of-concept code that demonstrates an exploit for Oracle Outside In Technology is publicly available. 

Oracle has released a security advisory at the following link: Oracle Critical Patch Update - July 2012

Oracle has released patches for registered users at the following link: Oracle

CentOS packages can be updated using the up2date or yum command.

Red Hat has released a security advisory at the following link: RHSA-2012-1462.

Red Hat has released updated software for registered subscribers at the following link: Red Hat Network. Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.

US-CERT has released a vulnerability note at the following link: VU#118913

 
Alert History
 
Version 2, July 23, 2012, 3:42 PM: Proof-of-concept code that demonstrates an exploit for Oracle Outside In Technology is publicly available. US-CERT has also released a vulnerability note to address this vulnerability.

Version 1, July 18, 2012, 10:40 AM: Oracle has released the July 2012 Critical Patch Update to address multiple security vulnerabilities in multiple Oracle products.


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Oracle CorporationAutoVue 20.0 .1, .2
Oracle CorporationOracle Application Server 10g 10.1.3 .0.0, .1.0, .2.0, .3.0, .4.0, .5.0, .5.1
Oracle CorporationOracle Clinical 4.6 Base, .2, .3
Oracle CorporationOracle Database Server 10g 10.2 .0.1, .0.2, .0.3, .0.4, .0.5
Oracle CorporationOracle Database Server 11g 11.1 .0.1.0, .0.2.0, .0.3.0, .0.4.0, .0.5.0, .0.6.0, .0.7.0 | 11.2 Base, .0.1, .0.2, .0.3
Oracle CorporationOracle E-Business Suite 11i 11.5.10.2 | 12.0 .4, .6 | 12.1 Base, .1, .2, .3
Oracle CorporationOracle Enterprise Manager Grid Control 10g 10.2 .0.1, .0.2, .0.3, .0.4, .0.5
Oracle CorporationOracle Fusion Middleware 11 .1.1.3.0, .1.1.4.0, .1.1.5.0, .1.1.6.0
Oracle CorporationOracle Hyperion Performance Suite 11.1 .Base, .1, .2
Oracle CorporationOracle Identity Management 10g 10.1.4.3 Base
Oracle CorporationOracle Outside In Technology 8.3.5 Base | 8.3.7 Base
Oracle CorporationOracle Secure Backup 10.3 .0.1, .0.2, .0.3 | 10.4 .0.1
Oracle CorporationOracle Siebel Customer Relationship Management (CRM) 8.1 .1 | 8.2 .2
Oracle CorporationOracle Transportation Manager 5.5 06.00 | 6.0 .03 | 6.1 Base | 6.2 Base
Oracle CorporationPeopleSoft Enterprise HRMS 9.0 Base | 9.1 Base
Oracle CorporationPeopleSoft Enterprise PeopleTools 8.50 Base | 8.51 Base | 8.52 Base
Oracle CorporationOracle Enterprise Manager Grid Control 11g 11.1 .0.7

Associated Products:
CentOS ProjectCentOS 6 .0 i386, .0 x86_64, .1 i386, .1 x86_64, .2 i386, .2 x86_64
Red Hat, Inc.Red Hat Enterprise Linux Desktop 6 IA-32, x86_64
Red Hat, Inc.Red Hat Enterprise Linux HPC Node 6 x86_64
Red Hat, Inc.Red Hat Enterprise Linux Server 6 IA-32, PPC, s390x, x86_64
Red Hat, Inc.Red Hat Enterprise Linux Workstation 6 IA-32, x86_64




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield