News

Oracle Releases Critical Updates

Oracle has released the latest quarterly round of critical patches for all its products.

Among the applications being updated are the Oracle database 9i through 11g, Oracle Application Server, Oracle PeopleSoft Enterprise CRM and the Oracle WebLogic Server (formerly BEA WebLogic Server).

Among the vulnerabilities being fixed are:

  1. A library path vulnerability in the Oracle database: This flaw allows Oracle users to execute code with root privileges by overriding the root program that sets user rights, according to security research firm iDefense. The vulnerability, which resides on Unix and Linux platforms, has been assigned the number in the CVE-2008-2613 in the Common Vulnerabilities and Exposures vulnerability database.

  2. A buffer overflow vulnerability in the Oracle database: This flaw allows users to execute code with database user privileges, according to iDefense. A queuing routine does not validate input, allowing an attacker to enter a long string of code that will overflow the buffer and place potentially damaging commands into memory. CVE-2008-2607.

  3. An input validation vulnerability in the Oracle Internet Directory: This flaw can enable a denial-of-service attack and bring down the directory by sending a flood of bogus Lightweight Directory Access Control packets to the program, according to iDefense. CVE-2008-2595.
Oracle releases critical patches in bundles on a quarterly basis. "They are released on the Tuesday closest to the 15th day of January, April, July and October," according to a page explaining the release schedule.

Typically, Oracle announces security fixes only when fixes are available for all the different platforms and versions. For most of Oracle's chief products, such as the Oracle Database Server and the Oracle Application Server, the patches are cumulative, meaning they contain all the fixes from previous critical patch updates. Patches for other products are provided on a one-off basis, meaning older patches will need to be applied independently.

This quarterly patch cycle is the first to assign CVE Identifiers (CVE-IDs) to vulnerabilities, according to Mitre, which oversees CVE management.

About the Author

Joab Jackson is the chief technology editor of Government Computing News (GCN.com).

comments powered by Disqus

Featured

  • Hands On: New VS Code Insiders Build Creates Web Page from Image in Seconds

    New Vision support with GitHub Copilot in the latest Visual Studio Code Insiders build takes a user-supplied mockup image and creates a web page from it in seconds, handling all the HTML and CSS.

  • Naive Bayes Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the naive Bayes regression technique, where the goal is to predict a single numeric value. Compared to other machine learning regression techniques, naive Bayes regression is usually less accurate, but is simple, easy to implement and customize, works on both large and small datasets, is highly interpretable, and doesn't require tuning any hyperparameters.

  • VS Code Copilot Previews New GPT-4o AI Code Completion Model

    The 4o upgrade includes additional training on more than 275,000 high-quality public repositories in over 30 popular programming languages, said Microsoft-owned GitHub, which created the original "AI pair programmer" years ago.

  • Microsoft's Rust Embrace Continues with Azure SDK Beta

    "Rust's strong type system and ownership model help prevent common programming errors such as null pointer dereferencing and buffer overflows, leading to more secure and stable code."

  • Xcode IDE from Microsoft Archrival Apple Gets Copilot AI

    Just after expanding the reach of its Copilot AI coding assistant to the open-source Eclipse IDE, Microsoft showcased how it's going even further, providing details about a preview version for the Xcode IDE from archrival Apple.

Subscribe on YouTube

Upcoming Training Events