Movatterモバイル変換


[0]ホーム

URL:


Country
Contact Sales

Oracle Critical Patch Update Advisory - October 2014

Description

A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:

Critical Patch Updates and Security Alerts for information about Oracle Security Advisories.

Oracle has received specific reports of malicious exploitation of vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that malicious attackers have been successful because customers had failed to apply these Oracle patches. Oracle thereforestrongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixeswithout delay.

Oracle acknowledges Dana Taylor of netinfiltration.com for bringing to Oracle's attention a number of sites that were vulnerable to disclosure of sensitive information because Oracle CPU fixes were not applied to those sites for more than a year.

This Critical Patch Update contains 154 new security fixes across the product families listed below. Please note that a blog entry summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located athttps://blogs.oracle.com/security.

Please note that on September 26, 2014, Oracle released aSecurity Alert for CVE-2014-7169 "Bash" and other publicly disclosed vulnerabilities affecting GNU Bash. Customers of affected Oracle products are strongly advised to apply the fixes that were announced in the Security Alert for CVE-2014-7169.

This Critical Patch Update advisory is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle's use of CVRF is available at:http://www.oracle.com/security-alerts/cpufaq.html#CVRF.

Affected Products and Components

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Products and Versions column. Please click on the link in the Patch Availability column below or in thePatch Availability Table to access the documentation for those patches.

The list of affected product releases and versions that are in Premier Support or Extended Support, under theOracle Lifetime Support Policy is as follows:

Affected Products and VersionsPatch Availability
Oracle Database 11g Release 1, version 11.1.0.7Database
Oracle Database 11g Release 2, versions 11.2.0.3, 11.2.0.4Database
Oracle Database 12c Release 1, versions 12.1.0.1, 12.1.0.2Database
Oracle Application Express, versions prior to 4.2.6Database
Oracle Fusion Middleware 11g Release 1, versions 11.1.1.5, 11.1.1.7Fusion Middleware
Oracle Fusion Middleware 11g Release 2, versions 11.1.2.1, 11.1.2.2, 11.1.2.4Fusion Middleware
Oracle Fusion Middleware 12c, versions 12.1.1.0, 12.1.2.0, 12.1.3.0Fusion Middleware
Oracle Fusion Applications, versions 11.1.2 through 11.1.8Fusion Applications
Oracle Access Manager, versions 11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2Fusion Middleware
Oracle Adaptive Access Manager, versions 11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2Fusion Middleware
Oracle Endeca Information Discovery Studio versions 2.2.2, 2.3, 2.4, 3.0, 3.1Fusion Middleware
Oracle Enterprise Data Quality versions 8.1.2, 9.0.11Fusion Middleware
Oracle Identity Manager, versions 11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2Fusion Middleware
Oracle JDeveloper, versions 10.1.3.5, 11.1.1.7, 11.1.2.4, 12.1.2.0, 12.1.3.0Fusion Middleware
Oracle OpenSSO version 3.0-04Fusion Middleware
Oracle WebLogic Server, versions 10.0.2, 10.3.6, 12.1.1, 12.1.2, 12.1.3Fusion Middleware
Application Performance Management, versions prior to 12.1.0.6.2Enterprise Manager
Enterprise Manager for Oracle Database Releases 10g, 11g, 12cEnterprise Manager
Oracle E-Business Suite Release 11i version 11.5.10.2E-Business Suite
Oracle E-Business Suite Release 12 versions 12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3, 12.2.2, 12.2.3, 12.2.4E-Business Suite
Oracle Agile PLM, versions 9.3.1.2, 9.3.3Oracle Supply Chain
Oracle Transportation Management, versions 6.1, 6.2, 6.3.0 through 6.3.5Oracle Supply Chain
Oracle PeopleSoft Enterprise HRMS, version 9.2PeopleSoft
Oracle PeopleSoft Enterprise PeopleTools, versions 8.52, 8.53, 8.54PeopleSoft
Oracle JD Edwards EnterpriseOne Tools, version 8.98JD Edwards
Oracle Communications MetaSolv Solution, versions MetaSolv Solution: 6.2.1.0.0, LSR: 9.4.0, 10.1.0, ASR: 49.0.0Communications
Oracle Communications Session Border Controller, version SCX640m5Communications
Oracle Retail Allocation, versions 10.0, 11.0, 12.0, 13.0, 13.1, 13.2Retail
Oracle Retail Clearance Optimization Engine, versions 13.3, 13.4, 14.0Retail
Oracle Retail Invoice Matching, versions 11.0, 12.0, 12.0 IN, 12.1, 13.0, 13.1, 13.2, 14.0Retail
Oracle Retail Markdown Optimization, versions 12.0, 13.0, 13.1, 13.2, 13.4Retail
Oracle Health Sciences Empirica Inspections, versions 1.0.1.0 and priorHealth Sciences
Oracle Health Sciences Empirica Signal, versions 7.3.3.3 and priorHealth Sciences
Oracle Health Sciences Empirica Study, versions 3.1.2.0 and priorHealth Sciences
Oracle Primavera Contract Management, versions 13.1, 14.0Primavera
Oracle Primavera P6 Enterprise Project Portfolio Management, versions 7.0, 8.0, 8.1, 8.2, 8.3Primavera
Oracle JavaFX, version 2.2.65Oracle Java SE
Oracle Java SE, versions 5.0u71, 6u81, 7u67, 8u20Oracle Java SE
Oracle Java SE Embedded, version 7u60Oracle Java SE
Oracle JRockit, versions R27.8.3, R28.3.3Oracle Java SE
Oracle Fujitsu server, versions M10-1, M10-4, M10-4SOracle and Sun Systems Products Suite
Oracle Solaris, versions 10, 11Oracle and Sun Systems Products Suite
Oracle Secure Global Desktop, versions 4.63, 4.71, 5.0, 5.1Oracle Linux and Virtualization
Oracle VM VirtualBox, versions prior to 4.1.34, 4.2.26, 4.3.14Oracle Linux and Virtualization
Oracle MySQL Server, versions 5.5.39 and earlier, 5.6.20 and earlierOracle MySQL Product Suite

Patch Availability Table and Risk Matrices

Patch Availability Table

For each administered Oracle product, consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update October 2014 Documentation Map,My Oracle Support Note 1907791.1.

Product GroupRisk MatrixPatch Availability and Installation Information
Oracle DatabaseOracle Database Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1912224.1
Oracle Fusion MiddlewareOracle Fusion Middleware Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1912224.1
Oracle Fusion ApplicationsOracle Database Risk Matrix andOracle Fusion Middleware Risk MatrixVulnerabilities affectingOracle Database andOracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document (October 2014)My Oracle Support Note 1933784.1 for information on patches to be applied to Fusion Application environments.
Oracle Enterprise ManagerOracle Enterprise Manage Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1912224.1
Oracle Applications - E-Business SuiteOracle E-Business Suite Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1923805.1
Oracle Applications - PeopleSoft Enterprise, Oracle Supply Chain and JD Edwards Product SuiteOracle PeopleSoft Enterprise Risk Matrix
Oracle Supply Chain Risk Matrix
Oracle JD Edwards Risk Matrix
Critical Patch Update Knowledge Document for PeopleSoft Enterprise, Oracle Supply Chain and JD Edwards Product SuiteMy Oracle Support Note 1933711.1
Oracle Communications Industry SuiteOracle Communications Applications Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1929597.1
Oracle Retail Industry SuiteOracle Retail Applications Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1929149.1
Oracle Health Sciences Industry SuiteOracle Health Sciences Applications Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1930332.1
Oracle Primavera Products SuiteOracle Primavera Products Suite Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1932448.1
Oracle Java SEOracle SE Risk Matrix
  • Critical Patch Update October 2014 Patch Availability Document for Java SE,My Oracle Support Note 1931846.1
  • Users running Java SE with a browser can download the latest release fromhttp://java.com.Users on the Windows and Mac OS X platforms can also useautomatic updates to get the latest release.
  • The latest JavaFX release is included with the latest update of JDK and JRE 7 and 8.
Oracle and Sun Systems Products SuiteOracle and Sun Systems Products Suite Risk MatrixCritical Patch Update October 2014 Patch Delivery Document for Oracle and Sun Systems Product Suite,My Oracle Support Note 1931712.1
Oracle Linux and Virtualization ProductsOracle Linux and Virtualization Products Risk MatrixPatch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1931903.1
Oracle MySQLOracle MySQL Risk MatrixCritical Patch Update October 2014 Patch Availability Document for Oracle MySQL Products,My Oracle Support Note 1926629.1

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found inprevious Critical Patch Update advisories. An English text version of the risk matrices provided in this document is available here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by aCVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the sameCVE# in all risk matrices.Italics indicate vulnerabilities in code included from other product areas.

Security vulnerabilities are scored using CVSS version 2.0 (seeOracle CVSS Scoring for an explanation of how Oracle applies CVSS 2.0). Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose information about the security analysis, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, seeOracle vulnerability disclosure policies.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected.The secure variant of a protocol is listed in the risk matrix only if it is theonly variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. Until you apply the CPU fixes, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security fixes as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security fixes announced in this CPU, please reviewprevious Critical Patch Update advisories to determine appropriate actions.

Product Dependencies

Oracle products may have dependencies on other Oracle products. Hence security vulnerability fixes announced in this Critical Patch Update may affect one or more dependent Oracle products. For details regarding these dependencies and how to apply patches to dependent products, please refer to Patch Set Update and Critical Patch Update October 2014 Availability Document,My Oracle Support Note 1912224.1.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly "Oracle Enterprise Manager Grid Control") and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained inMy Oracle Support Note 209768.1. Please review theTechnical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Critical Patch Update program are available to customers who have purchased Extended Support under theLifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Critical Patch Update program for products in the Extended Support Phase.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle: 0ang3el; Adam Gowdiak of Security Explorations; Adam Willard of Foreground Security; Alberto Garcia Illera of Salesforce.com; Alexey Tyurin of ERPScan; Dhanesh K.; Florian Weimer of Red Hat; Gleb Cherbov of ERPScan; Ilja van Sprundel of ioactive.com; Ivan Chalykin of ERPScan; Jakub Palaczynski; Khai Tran of Netspi; Laszlo Toth; Lupin LanYuShi; Meder Kydyraliev of Google; Nikita Kelesis of ERPScan; Recx; Richard Dalton; Sergey Gorbaty of Salesforce.com; Sloane Bernstein of cPanel; Stefan Nordhausen; Wolfgang Ettlinger of SEC Consult Vulnerability Lab; Yash Kadakia of Security Brigade; Yuki Chen of Qihoo working with HP's Zero Day Initiative; and Zubin Mithra.

Security-In-Depth Contributors

Oracle provides recognition to people that have contributed to our Security-In-Depth program (seeFAQ). People are recognized for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update Advisory, Oracle recognizes Danny Tsechansky of McAfee Security Research; G. Geshev from MWR Labs; and Tudor Enache of Help AG for contributions to Oracle's Security-In-Depth program.

On-Line Presence Security Contributors

Oracle provides recognition to people that have contributed to our On-Line Presence Security program (seeFAQ). People are recognized for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.

For this quarter, Oracle recognizes 1NC0GN1T0; Abdul Wasay; Adam Willard of Foreground Security; Ayoub Fathi; Barry Cogan of CAaNES; Ben Khlifa Fahmi; Benjamin Kunz Mejri of Evolution Security; Bikash Dash; Hardik Tailor; Ismail Belkacim; Jay Jani; Jitendra Jaiswal; Justine Edic; Koutrouss Naddara; Lalit Kumar; Mohammad Yaseen Khan; Mohammed Fayez Albanna; Nicholas Lemonias of Advanced Information Security Corporation; Parth Malhotra; Ranjan Kathuria; Sahil Dhar; and Satheesh Raj for contributions to Oracle's On-Line Presence Security program.

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 20 January 2015
  • 14 April 2015
  • 14 July 2015
  • 20 October 2015

References

Modification History

2014-November-21Rev 5. Corrected that CVE-2014-2478 does not affect client-only installations
2014-November-06Rev 4. Corrected CVE-2014-4301 to CVE-2014-6477
2014-November-03Rev 3. Updated the note for CVE-2014-6468
2014-October-20Rev 2. Removed 12.1.0.2 from the affected versions list for CVE-2014-6544 and CVE-2014-4289
2014-October-14Rev 1. Initial Release

Appendix - Oracle Database Server

Oracle Database Server Executive Summary

This Critical Patch Update contains 31 new security fixes for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. 3 of these fixes are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be foundhere.

Java VM and SQLJ are components of the database that are installed by default. JPublisher is not installed by default; however, there are server-side components of JPublisher that are installed in the database by default.

Oracle Database Server Risk Matrix

CVE#ComponentProtocolPackage and/or Privilege RequiredRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6546JPublisherOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6467Java VMOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6545Java VMOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6453Java VMOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6560Java VMOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6455SQLJOracle NetCreate SessionNo9.0NetworkLowSingleCompleteCompleteComplete11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2See Note 1
CVE-2014-6537Java VMOracle NetCreate SessionNo6.5NetworkLowSinglePartialPartialPartial11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6483Application ExpressHTTPCreate SessionNo6.0NetworkMediumSinglePartialPartialPartialAll releases prior to 4.2.6 
CVE-2014-0050Application ExpressHTTPNoneYes5.0NetworkLowNoneNoneNonePartialAll releases prior to 4.2.6 
CVE-2014-6547JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4293JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4292JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4291JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4290JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4297JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4296JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6477JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4310JPublisherOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6538Java VMOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4295Java VMOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4294Java VMOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6563Java VMOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6542SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4298SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4299SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-4300SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6452SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6454SQLJOracle NetCreate SessionNo4.0NetworkLowSinglePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, 12.1.0.2 
CVE-2014-6544JDBCOracle NetCreate SessionNo3.6NetworkHighSinglePartialPartialNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1 
CVE-2014-4289JDBCOracle NetCreate SessionNo3.6NetworkHighSinglePartialPartialNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1 
CVE-2014-2478Core RDBMSOracle NetnoneYes2.6NetworkHighNonePartialNoneNone11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1 

Notes:

  1. These vulnerabilities have a CVSS score of 9.0 on Windows and the confidentiality, availability and integrity impacts are Complete. These vulnerabilities have a CVSS score of 6.5 on non-Windows and the confidentiality, availability and integrity impacts are Partial+.

Oracle Database Server Client-Only Installations

The following Oracle Database Server vulnerabilities included in this Critical Patch Update affect client-only installations: CVE-2014-6544 and CVE-2014-4289.

Appendix - Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 18 new security fixes for Oracle Fusion Middleware. 14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in theOracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the October 2014 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2014 Patch Availability Document for Oracle Products,My Oracle Support Note 1912224.1.

Oracle Fusion Middleware Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-0114Oracle Adaptive Access ManagerHTTPOAAM Server (Struts based)Yes7.5NetworkLowNonePartialPartialPartial11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2 
CVE-2014-0114Oracle Enterprise Data QualityHTTPLaunchpad (Struts based)Yes7.5NetworkLowNonePartialPartialPartial8.1.2, 9.0.11 
CVE-2014-0114Oracle Identity ManagerHTTPOIM Legacy UI (Struts based)Yes7.5NetworkLowNonePartialPartialPartial11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2 
CVE-2013-1741Oracle OpenSSOHTTPSWeb AgentsYes7.5NetworkLowNonePartial+Partial+Partial+3.0-04See Note 1
CVE-2014-0224Oracle Endeca Information Discovery StudioHTTPStudioYes6.8NetworkMediumNonePartialPartialPartial3.1See Note 2
CVE-2014-6499Oracle WebLogic ServerHTTPWebLogic Tuxedo ConnectorYes6.8NetworkMediumNonePartialPartialPartial10.0.2.0, 10.3.6.0, 12.1.1.0, 12.1.2.0, 12.1.3.0See Note 3
CVE-2014-0114Oracle WebLogic ServerHTTPWLS-Console (Struts based)No6.5NetworkLowSinglePartial+Partial+Partial+10.0.2.0, 10.3.6.0, 12.1.1.0, 12.1.2.0, 12.1.3.0 
CVE-2014-6553Oracle Access ManagerHTTPAdmin ConsoleYes6.4NetworkLowNonePartialPartialNone11.1.1.5, 11.1.1.7 
CVE-2014-6554Oracle Access ManagerHTTPAdmin ConsoleNo5.5NetworkLowSinglePartialPartialNone11.1.2.1, 11.1.2.2 
CVE-2014-0050Oracle Endeca Information Discovery StudioHTTPStudioYes5.0NetworkLowNoneNoneNonePartial2.2.2, 2.3, 2.4, 3.0, 3.1See Note 4
CVE-2014-6552Oracle Access ManagerHTTPAdmin ConsoleYes4.3NetworkMediumNoneNonePartialNone11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2 
CVE-2014-6462Oracle Access ManagerHTTPAdmin ConsoleYes4.3NetworkMediumNoneNonePartialNone11.1.2.1, 11.1.2.2 
CVE-2014-0119Oracle Enterprise Data QualityHTTPInternal OperationsYes4.3NetworkMediumNonePartialNoneNone8.1.2, 9.0.11See Note 5
CVE-2014-2880Oracle Identity ManagerHTTPUser ManagementYes4.3NetworkMediumNoneNonePartialNone11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2 
CVE-2014-6522Oracle JDeveloperHTTPADF FacesYes4.3NetworkMediumNoneNonePartialNone11.1.1.7, 11.1.2.4, 12.1.2.0, 12.1.3.0 
CVE-2014-6534Oracle WebLogic ServerHTTPWLS ConsoleNo4.0NetworkLowSingleNonePartialNone10.0.2.0, 10.3.6.0, 12.1.1.0, 12.1.2.0, 12.1.3.0 
CVE-2014-6487Oracle Identity ManagerHTTPEnd User Self ServiceNo3.5NetworkMediumSingleNonePartialNone11.1.1.5, 11.1.1.7, 11.1.2.1, 11.1.2.2 
CVE-2014-0114Oracle JDeveloperHTTPADF Controllers (Struts based)Yes0.0NetworkLowNoneNoneNoneNone10.1.3.5, 11.1.1.7, 11.1.2.4, 12.1.2.0, 12.1.3.0See Note 6

Notes:

  1. This fix also addresses CVE-2013-1739,CVE-2013-1740, CVE-2013-5605, CVE-2013-5606,CVE-2014-1490, CVE-2014-1491, CVE-2014-1492.
  2. This fix also addresses CVE-2014-3470,CVE-2010-5298,CVE-2014-0221,CVE-2014-0195,CVE-2014-0198.
  3. Please refer to Doc IDMy Oracle Support Note 1930466.1 for instructions on how to address this issue.
  4. This fix also addresses CVE-2013-4286,CVE-2013-4322,CVE-2013-4590,CVE-2014-0033.
  5. This fix also addresses CVE-2013-4286,CVE-2013-4322,CVE-2013-4590,CVE-2014-0033,CVE-2014-0050,CVE-2014-0075,CVE-2014-0095,CVE-2014-0096.
  6. Please refer to Doc IDMy Oracle Support Note 1926728.1 for instructions on how to address this issue. This fix also addresses CVE-2014-0050.

Appendix - Oracle Enterprise Manager Grid Control

Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle Enterprise Manager Grid Control. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without the need for a username and password. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be foundhere.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in theOracle Database andOracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2014 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2014 Patch Availability Document for Oracle Products,My Oracle Support Note 1912224.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6557Application Performance ManagementHTTPEnd User Experience ManagementNo4.9NetworkMediumSinglePartialPartialNoneAll releases prior to 12.1.0.6.2 
CVE-2014-6488Enterprise Manager for Oracle DatabaseHTTPContent ManagementNo2.1NetworkHighSingleNonePartialNoneEM Base Platform: 10.2.0.5, 11.1.0.1 EM DB Control: 11.1.0.7, 11.2.0.3, 11.2.0.4 EM Plugin for DB: 12.1.0.4, 12.1.0.5, 12.1.0.6 

Appendix - Oracle Applications

Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 10 new security fixes for the Oracle E-Business Suite. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in theOracle Database andOracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2014 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Releases 11i and 12 Critical Patch Update Knowledge Document (October 2014),My Oracle Support Note 1923805.1.

Oracle E-Business Suite Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-4278Oracle Applications Technology StackHTTPOracle FormsYes7.5NetworkLowNonePartial+Partial+Partial+12.0.6, 12.1.3, 12.2.2, 12.2.3, 12.2.4See Note 1
CVE-2014-6539Oracle Applications FrameworkHTTPLOVYes4.3NetworkMediumNoneNonePartialNone11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-6472Oracle Applications FrameworkHTTPLOVYes4.3NetworkMediumNoneNonePartialNone11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-4281Oracle Applications FrameworkHTTPPortal IntegrationYes4.3NetworkMediumNoneNonePartialNone12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-6471Oracle Applications ManagerHTTPOAM DiagnosticsYes4.3NetworkMediumNoneNonePartialNone12.0.6, 12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-6550Oracle Applications Object LibraryHTTPiHelpYes4.3NetworkMediumNoneNonePartialNone11.5.10.2 
CVE-2014-4285Oracle Applications TechnologyHTTPReports ConfigurationYes4.3NetworkMediumNoneNonePartialNone11.5.10.2 
CVE-2014-6561Oracle PaymentsHTTPSeparate Remittance AdviceYes4.3NetworkMediumNonePartialNoneNone12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-6523Oracle Applications FrameworkHTTPREST InterfaceNo4.0NetworkLowSinglePartialNoneNone12.1.3, 12.2.2, 12.2.3, 12.2.4 
CVE-2014-6479Oracle Applications TechnologyHTTPOC4J ConfigurationNo4.0NetworkLowSinglePartialNoneNone11.5.10.2, 12.0.6, 12.1.3 

Notes:

  1. This is an Oracle E-Business Suite specific fix in Oracle Fusion Middleware.

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 5 new security fixes for the Oracle Supply Chain Products Suite. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Supply Chain Products Suite Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6533Oracle Transportation ManagementHTTPSecurityYes6.8NetworkMediumNonePartialPartialPartial6.1, 6.2 
CVE-2014-6498Oracle Transportation ManagementHTTPSecurityYes5.0NetworkLowNonePartialNoneNone6.1, 6.2, 6.3, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5 
CVE-2014-6461Agile PLMHTTPRoles & PrivilegesNo4.9NetworkMediumSinglePartial+Partial+None9.3.1.2 
CVE-2014-6543Agile PLMHTTPITEM (Item & BOM)No3.6NetworkHighSinglePartialPartialNone9.3.3 
CVE-2014-6536Agile PLMHTTPSecurityNo3.5NetworkMediumSingleNonePartialNone9.3.3 

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 5 new security fixes for Oracle PeopleSoft Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle PeopleSoft Products Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6535PeopleSoft Enterprise PeopleToolsHTTPSECURITYYes5.8NetworkMediumNonePartialPartialNone8.52, 8.53, 8.54 
CVE-2014-6460PeopleSoft Enterprise PeopleToolsHTTPQUERYNo4.9NetworkMediumSinglePartial+Partial+None8.52, 8.53, 8.54 
CVE-2014-6486PeopleSoft Enterprise HRMSHTTPSTalent Acquisition Manager - SecurityNo4.0NetworkLowSingleNonePartialNone9.2 
CVE-2014-6482PeopleSoft Enterprise PT PeopleToolsHTTPUpdates Change AssistantNo4.0NetworkLowSingleNonePartialNone8.53, 8.54 
CVE-2014-6475PeopleSoft Enterprise PeopleToolsHTTPSecurityNo3.5NetworkMediumSinglePartialNoneNone8.52, 8.53, 8.54 

Oracle JD Edwards Products Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle JD Edwards Products. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle JD Edwards Products Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6516JD Edwards EnterpriseOne ToolsHTTPInstallation SECNo4.3LocalLowSinglePartial+Partial+Partial+8.98 

Appendix - Oracle Industry Applications

Oracle Communications Applications Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle Communications Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Communications Applications Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-0114Oracle Communications MetaSolv SolutionHTTPInfrastructure, LSR, ASR (Struts based)Yes7.5NetworkLowNonePartialPartialPartialMetaSolv Solution: 6.2.1.0.0, LSR: 9.4.0, 10.1.0, ASR: 49.0.0 
CVE-2014-6465Oracle Communications Session Border ControllerTCP/TLSLawful InterceptNo6.3NetworkMediumSingleNoneNoneCompleteSCX640m5 

Oracle Retail Applications Executive Summary

This Critical Patch Update contains 4 new security fixes for Oracle Retail Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Retail Applications Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-0114Oracle Retail AllocationHTTPGeneral application (Struts based)Yes7.5NetworkLowNonePartial+Partial+Partial+10.0, 11.0, 12.0, 13.0, 13.1, 13.2 
CVE-2014-0114Oracle Retail Clearance Optimization EngineHTTPGeneral application (Struts based)Yes7.5NetworkLowNonePartial+Partial+Partial+13.3, 13.4, 14.0 
CVE-2014-0114Oracle Retail Invoice MatchingHTTPGeneral application (Struts based)Yes7.5NetworkLowNonePartial+Partial+Partial+11.0, 12.0, 12.0 IN, 12.1, 13.0, 13.1, 13.2, 14.0 
CVE-2014-0114Oracle Retail Markdown OptimizationHTTPGeneral application (Struts based)Yes7.5NetworkLowNonePartial+Partial+Partial+12.0, 13.0, 13.1, 13.2, 13.4 

Oracle Health Sciences Applications Executive Summary

This Critical Patch Update contains 3 new security fixes for Oracle Health Sciences Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Health Sciences Applications Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-0050Oracle Health Sciences Empirica InspectionsHTTPTomcat, FileUploadYes5.0NetworkLowNoneNoneNonePartial1.0.1.0 and priorSee Note 1
CVE-2014-0050Oracle Health Sciences Empirica SignalHTTPTomcat, FileUploadYes5.0NetworkLowNoneNoneNonePartial7.3.3.3 and priorSee Note 1
CVE-2014-0050Oracle Health Sciences Empirica StudyHTTPTomcat, FileUploadYes5.0NetworkLowNoneNoneNonePartial3.1.2.0 and priorSee Note 1

Notes:

  1. This fix also addresses CVE-2013-4286, CVE-2013-4322, CVE-2013-4590 and CVE-2014-0033.

Appendix - Oracle Primavera Products Suite

Oracle Primavera Products Suite Executive Summary

This Critical Patch Update contains 2 new security fixes for the Oracle Primavera Products Suite. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Primavera Products Suite Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-0114Primavera Contract ManagementHTTPWeb Access (Struts based)No6.5NetworkLowSinglePartialPartialPartial13.1, 14.0 
CVE-2014-0114Primavera P6 Enterprise Project Portfolio ManagementHTTPWeb Access (Struts based)No6.5NetworkLowSinglePartialPartialPartial7.0, 8.0, 8.1, 8.2, 8.3 

Appendix - Oracle Java SE

Oracle Java SE Executive Summary

This Critical Patch Update contains 25 new security fixes for Oracle Java SE. 22 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", lowering the CVSS Base Score. For example, a Base Score of 10.0 becomes 7.5.

Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 7 and 8 releases.

My Oracle Support Note 360870.1 explains the impact of Java security vulnerabilities on Oracle products that include an Oracle Java SE JDK or JRE.

Oracle Java SE Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6513Java SE, Java SE EmbeddedMultipleAWTYes10.0NetworkLowNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60See Note 1
CVE-2014-6532Java SEMultipleDeploymentYes9.3NetworkMediumNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6503Java SEMultipleDeploymentYes9.3NetworkMediumNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6456Java SEMultipleDeploymentYes9.3NetworkMediumNoneCompleteCompleteCompleteJava SE 7u67, Java SE 8u20See Note 1
CVE-2014-6562Java SEMultipleLibrariesYes9.3NetworkMediumNoneCompleteCompleteCompleteJava SE 8u20See Note 1
CVE-2014-6485Java SE, JavaFXMultipleJavaFXYes9.3NetworkMediumNoneCompleteCompleteCompleteJava SE 8u20, JavaFX 2.2.65See Note 1
CVE-2014-6492Java SEMultipleDeploymentYes7.6NetworkHighNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 2
CVE-2014-6493Java SEMultipleDeploymentYes7.6NetworkHighNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-4288Java SEMultipleDeploymentYes7.6NetworkHighNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6466Java SENoneDeploymentNo6.9LocalMediumNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 3
CVE-2014-6458Java SENoneDeploymentNo6.9LocalMediumNoneCompleteCompleteCompleteJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6468Java SENoneHotspotNo6.9LocalMediumNoneCompleteCompleteCompleteJava SE 8u20See Note 6
CVE-2014-6506Java SE, Java SE EmbeddedMultipleLibrariesYes6.8NetworkMediumNonePartialPartialPartialJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60See Note 1
CVE-2014-6511Java SEMultiple2DYes5.0NetworkLowNonePartialNoneNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6476Java SEMultipleDeploymentYes5.0NetworkLowNoneNonePartialNoneJava SE 7u67, Java SE 8u20See Note 1
CVE-2014-6515Java SESSL/TLSDeploymentYes5.0NetworkLowNoneNonePartialNoneJava SE 6u81, Java SE 7u67, Java SE 8u20See Note 1
CVE-2014-6504Java SE, Java SE EmbeddedMultipleHotspotYes5.0NetworkLowNonePartialNoneNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE Embedded 7u60See Note 1
CVE-2014-6519Java SE, Java SE EmbeddedMultipleHotspotYes5.0NetworkLowNoneNonePartialNoneJava SE 7u67, Java SE 8u20, Java SE Embedded 7u60See Note 1
CVE-2014-6517Java SE, Java SE Embedded, JRockitMultipleJAXPYes5.0NetworkLowNonePartialNoneNoneJava SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60, JRockit R27.8.3, JRockit R28.3.3See Note 4
CVE-2014-6531Java SE, Java SE EmbeddedHTTPLibrariesYes4.3NetworkMediumNonePartialNoneNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60See Note 1
CVE-2014-6512Java SE, Java SE Embedded, JRockitMultipleLibrariesYes4.3NetworkMediumNoneNonePartialNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60, JRockit R27.8.3, JRockit R28.3.3See Note 4
CVE-2014-6457Java SE, Java SE Embedded, JRockitSSL/TLSJSSEYes4.0NetworkHighNonePartialPartialNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60, JRockit R27.8.3, JRockit R28.3.3See Note 5
CVE-2014-6527Java SEMultipleDeploymentYes2.6NetworkHighNoneNonePartialNoneJava SE 7u67, Java SE 8u20See Note 1
CVE-2014-6502Java SE, Java SE EmbeddedMultipleLibrariesYes2.6NetworkHighNoneNonePartialNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60See Note 1
CVE-2014-6558Java SE, Java SE Embedded, JRockitMultipleSecurityYes2.6NetworkHighNoneNonePartialNoneJava SE 5.0u71, Java SE 6u81, Java SE 7u67, Java SE 8u20, Java SE Embedded 7u60, JRockit R27.8.3, JRockit R28.3.3See Note 4

Notes:

  1. Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.
  2. Applies to client deployment of Java on Firefox only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.
  3. Applies to client deployment of Java on Internet Explorer only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.
  4. Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
  5. Applies to client and server deployment of JSSE.
  6. Applies to client and server deployment of Java. This vulnerability requires local access to the victim environment in order to plant the affected jar file. Once the affected jar file was planted, this vulnerability can be triggered through sandboxed Java Web Start applications, sandboxed Java applets, and launching the affected application locally. It can also be triggered by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Appendix - Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 15 new security fixes for the Oracle Sun Systems Products Suite. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Sun Systems Products Suite Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6508SolarisTCP/IPiSCSI Data Mover(IDM)Yes7.8NetworkLowNoneNoneNoneComplete10, 11 
CVE-2014-4276SolarisCIFSCommon Internet File System(CIFS)Yes7.5NetworkLowNonePartialPartialPartial11 
CVE-2014-4282SolarisNoneKernel/X86No7.2LocalLowNoneCompleteCompleteComplete11 
CVE-2014-6473SolarisNoneZone FrameworkNo7.2LocalLowNoneCompleteCompleteComplete10, 11See Note 1
CVE-2014-0224Fujitsu M10-1, Fujitsu M10-4, Fujitsu M10-4S serversSSL/TLSXCPYes6.8NetworkMediumNonePartialPartialPartialXCP prior to XCP2221 
CVE-2014-6470SolarisNoneArchive UtilityNo6.8LocalLowSingleCompleteCompleteComplete11 
CVE-2014-6529SolarisNoneHermon HCA PCIe driverNo6.8Adjacent NetworkHighNoneCompleteCompleteComplete11 
CVE-2014-4277SolarisHTTPAutomated Install EngineYes5.0NetworkLowNonePartialNoneNone11 
CVE-2014-6490SolarisSMBSMB server user componentYes5.0NetworkLowNoneNoneNonePartial11 
CVE-2014-6497SolarisNoneKernelNo4.9LocalLowNoneNoneNoneComplete11 
CVE-2014-4275SolarisNoneSMB server kernel moduleNo4.9LocalLowNoneNoneNoneComplete11 
CVE-2014-4280SolarisNoneIPS transfer moduleNo4.6LocalLowNonePartialPartialPartial11 
CVE-2014-4284SolarisNoneIPS transfer moduleNo4.4LocalMediumNonePartialPartialPartial11 
CVE-2014-4283SolarisSSL/TLSAutomated Install EngineYes4.3NetworkMediumNonePartialNoneNone11 
CVE-2014-6501SolarisNoneSSHNo2.1LocalLowNonePartialNoneNone11 

Notes:

  1. For Solaris 10, it only applies to SPARC systems with Solaris 8 and Solaris 9 branded zones.

Appendix - Oracle Linux and Virtualization

Oracle Virtualization Executive Summary

This Critical Patch Update contains 7 new security fixes for Oracle Virtualization. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle Virtualization Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-2472Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv)Yes5.0NetworkLowNoneNoneNonePartial5.0, 5.1 
CVE-2014-2474Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv)Yes5.0NetworkLowNoneNoneNonePartial5.0, 5.1 
CVE-2014-2475Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv)Yes5.0NetworkLowNoneNoneNonePartial4.63, 4.71, 5.0, 5.1 
CVE-2014-2476Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv)Yes5.0NetworkLowNoneNoneNonePartial5.0, 5.1 
CVE-2014-6459Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv)Yes5.0NetworkLowNoneNoneNonePartial5.0, 5.1 
CVE-2014-2473Oracle Secure Global DesktopMultipleSGD Proxy Server (ttaauxserv) and SGD SSL Daemon (ttassl)Yes5.0NetworkLowNoneNoneNonePartial5.0, 5.1 
CVE-2014-6540Oracle VM VirtualBoxNoneGraphics driver (WDDM) for Windows guestsNo1.9LocalMediumNoneNoneNonePartialVirtualBox prior to 4.1.34, 4.2.26, 4.3.14 

Appendix - Oracle MySQL

Oracle MySQL Executive Summary

This Critical Patch Update contains 24 new security fixes for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be foundhere.

Oracle MySQL Risk Matrix

CVE#ComponentProtocolSub­componentRemote Exploit without Auth.?CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions)Supported Versions AffectedNotes
Base ScoreAccess VectorAccess ComplexityAuthen­ticationConfiden­tialityIntegrityAvail­ability
CVE-2014-6507MySQL ServerMySQL ProtocolSERVER:DMLNo8.0NetworkLowSinglePartial+Partial+Complete5.5.39 and eariler, 5.6.20 and earlier 
CVE-2014-6491MySQL ServerMySQL ProtocolSERVER:SSL:yaSSLYes7.5NetworkLowNonePartial+Partial+Partial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6500MySQL ServerMySQL ProtocolSERVER:SSL:yaSSLYes7.5NetworkLowNonePartial+Partial+Partial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6469MySQL ServerMySQL ProtocolSERVER:OPTIMIZERNo6.8NetworkLowSingleNoneNoneComplete5.5.39 and eariler, 5.6.20 and earlier 
CVE-2014-0224MySQL ServerMySQL ProtocolSERVER:SSL:OpenSSLYes6.8NetworkMediumNonePartialPartialPartial5.6.19 and earlierSee Note 1
CVE-2014-6530MySQL ServerMySQL ProtocolCLIENT:MYSQLDUMPNo6.5NetworkLowSinglePartial+Partial+Partial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6555MySQL ServerMySQL ProtocolSERVER:DMLNo6.5NetworkLowSinglePartial+Partial+Partial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6489MySQL ServerMySQL ProtocolSERVER:SPNo5.5NetworkLowSingleNonePartialPartial+5.6.19 and earlier 
CVE-2012-5615MySQL ServerMySQL ProtocolSERVER:PRIVILEGES AUTHENTICATION PLUGIN APIYes5.0NetworkLowNonePartialNoneNone5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6559MySQL ServerMySQL ProtocolC API SSL CERTIFICATE HANDLINGYes4.3NetworkMediumNonePartial+NoneNone5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6494MySQL ServerMySQL ProtocolCLIENT:SSL:yaSSLYes4.3NetworkMediumNoneNoneNonePartial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6496MySQL ServerMySQL ProtocolCLIENT:SSL:yaSSLYes4.3NetworkMediumNoneNoneNonePartial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6495MySQL ServerMySQL ProtocolSERVER:SSL:yaSSLYes4.3NetworkMediumNoneNoneNonePartial5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6478MySQL ServerMySQL ProtocolSERVER:SSL:yaSSLYes4.3NetworkMediumNoneNonePartialNone5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-4274MySQL ServerMySQL ProtocolSERVER:MyISAMNo4.1LocalMediumSinglePartial+Partial+Partial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-4287MySQL ServerMySQL ProtocolSERVER:CHARACTER SETSNo4.0NetworkLowSingleNoneNonePartial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6520MySQL ServerMySQL ProtocolSERVER:DDLNo4.0NetworkLowSingleNoneNonePartial+5.5.38 and earlier 
CVE-2014-6484MySQL ServerMySQL ProtocolSERVER:DMLNo4.0NetworkLowSingleNoneNonePartial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6464MySQL ServerMySQL ProtocolSERVER:INNODB DML FOREIGN KEYSNo4.0NetworkLowSingleNoneNonePartial+5.5.39 and earlier, 5.6.20 and earlier 
CVE-2014-6564MySQL ServerMySQL ProtocolSERVER:INNODB FULLTEXT SEARCH DMLNo4.0NetworkLowSingleNoneNonePartial+5.6.19 and earlier 
CVE-2014-6505MySQL ServerMySQL ProtocolSERVER:MEMORY STORAGE ENGINENo4.0NetworkLowSingleNoneNonePartial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6474MySQL ServerMemcachedSERVER:MEMCACHEDNo3.5NetworkMediumSingleNoneNonePartial+5.6.19 and earlier 
CVE-2014-6463MySQL ServerMySQL ProtocolSERVER:REPLICATION ROW FORMAT BINARY LOG DMLNo3.3NetworkLowMultipleNoneNonePartial+5.5.38 and earlier, 5.6.19 and earlier 
CVE-2014-6551MySQL ServerMySQL ProtocolCLIENT:MYSQLADMINNo2.1LocalLowNonePartialNoneNone5.5.38 and earlier, 5.6.19 and earlier 

Notes:

  1. This fix also addresses CVE-2010-5298,CVE-2014-0195,CVE-2014-0198,CVE-2014-0221,CVE-2014-3470

[8]ページ先頭

©2009-2025 Movatter.jp