Oracle (and BEA, Hyperion and TimesTen) critical patch update July 15th, 2008

Published: 2008-07-15
Last Updated: 2008-07-15 20:45:56 UTC
by Maarten Van Horenbeeck (Version: 2)
0 comment(s)

Today, July 15th, Oracle has released its quarterly critical patch update. The highest CVSS score of all vulnerabilities patched is 6.8 (6.5 is the maximum for the Oracle Database itself).

Below is the list of software affected, as listed in the pre-release announcement:

    • Oracle Database 11g, version
    • Oracle Database 10g Release 2, versions,,
    • Oracle Database 10g, version
    • Oracle Database 9i Release 2, versions,
    • Oracle Database 9i, version FIPS+
    • Oracle TimesTen In-Memory Database version
    • Oracle Application Server 10g Release 3 (10.1.3), versions,
    • Oracle Application Server 10g Release 2 (10.1.2), versions,
    • Oracle Application Server 10g (9.0.4), version
    • Oracle Application Server 9i Release 1, version
    • Oracle Hyperion BI Plus versions,, and
    • Oracle Hyperion Performance Suite versions, and
    • Oracle E-Business Suite Release 12, version 12.0.4
    • Oracle E-Business Suite Release 11i, version
    • Oracle Enterprise Manager Database Control 11i version
    • Oracle Enterprise Manager Database Control 10g Release 2, versions,,
    • Oracle Enterprise Manager Database Control 10g Release 1, version
    • Oracle Enterprise Manager Grid Control 10g Release 1, versions,
    • Oracle PeopleSoft Enterprise PeopleTools versions 8.48.18, 8.49.12
    • Oracle PeopleSoft Enterprise CRM version 8.9, 9.0
    • Oracle WebLogic Server 10.0 released through MP1
    • Oracle WebLogic Server 9.0, 9.1, 9.2 released through MP3
    • Oracle WebLogic Server 8.1 released through SP6
    • Oracle WebLogic Server 7.0 released through SP7
    • Oracle WebLogic Server 6.1 released through SP7

Oracle notes that this is the first time patches for BEA, Hyperion and TimesTen technology are included in the release. If you are running software from these recently-acquired vendors, please be aware.

It should be noted that the CVSS for application software vulnerabilities such as a database are generally lower, but not necessarily less critical in specific environments. A bug may not give access to the underlying operating system, but in the case of a database we tend to be more worried about the data housed there than other software running on the same system.

We recommend reviewing the pre-release announcement, and subsequent release, closely, and prioritize patching according to your specific environment's requirements.

0 comment(s)


Diary Archives