__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Oracle Critical Patch Update - April 2008 [cpuapr2008] April 17, 2008 18:00 GMT Number S-264 ______________________________________________________________________________ PROBLEM: Oracle has released a critical patch update for multiple security vulnerabilities. PLATFORM: • Oracle Database 11g, version 11.1.0.6 • Oracle Database 10g Release 2, versions 10.2.0.2, 10.2.0.3 • Oracle Database 10g, version 10.1.0.5 • Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV • Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.1.0, 10.1.3.3.0 • Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0 • Oracle Application Server 10g (9.0.4), version 9.0.4.3 • Oracle Collaboration Suite 10g, version 10.1.2 • Oracle E-Business Suite Release 12, version 12.0.4 • Oracle E-Business Suite Release 11i, version 11.5.10.2 • Oracle PeopleSoft Enterprise PeopleTools versions 8.22.19, 8.48.16, 8.49.09 • Oracle PeopleSoft Enterprise HCM versions 8.8 SP1, 8.9, 9.0 • Oracle Siebel SimBuilder versions 7.8.2, 7.8.5 DAMAGE: May be remotely exploitable without authentication, i.e. them may be exploited over a network with out the need for a username or password. SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. May be remotely exploitable without ASSESSMENT: authentication, i.e. them may be exploited over a network with out the need for a username or password. ______________________________________________________________________________ CVSS 2 BASE SCORE: 6.6 TEMPORAL SCORE: 5.2 VECTOR: (AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C) ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/s-264.shtml ORIGINAL BULLETIN: http://www.oracle.com/technology/deploy/security/critical -patch-updates/cpuapr2008.html ADDITONAL LINK: Visit Hewlett-Packard's Subscription Service for: HPSBMA02133 SSRT061201 rev. 8 ______________________________________________________________________________ [***** Start cpuapr2008 *****] Oracle Critical Patch Update Advisory - April 2008 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. Critical Patch Updates are cumulative, except as noted below, but each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes. Please refer to Critical Patch Updates and Security Alerts for information about Oracle Security Advisories. Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible. This Critical Patch Update contains 41 new security fixes across all products. Supported Products and Components Affected Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in [square brackets] following the product versions. Please click on the link in [square brackets] or in the Patch Availability Table to access the documentation for those patches. Oracle Configuration Manager (OCM) is included in this Critical Patch Update. OCM enables Oracle to provide superior, proactive support to our customers. For more information, go to http://www.oracle.com/technology/documentation/ocm.html. Category I Product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support policy: • Oracle Database 11g, version 11.1.0.6 [ Database ] • Oracle Database 10g Release 2, versions 10.2.0.2, 10.2.0.3 [ Database ] • Oracle Database 10g, version 10.1.0.5 [ Database ] • Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV [ Database ] • Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.1.0, 10.1.3.3.0 [ Application Server ] • Oracle Application Server 10g Release 2 (10.1.2), versions 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0 [ Application Server ] • Oracle Application Server 10g (9.0.4), version 9.0.4.3 [ Application Server ] • Oracle Collaboration Suite 10g, version 10.1.2 [ Collaboration Suite ] • Oracle E-Business Suite Release 12, version 12.0.4 [ E-Business Suite ] • Oracle E-Business Suite Release 11i, version 11.5.10.2 [ E-Business Suite ] • Oracle PeopleSoft Enterprise PeopleTools versions 8.22.19, 8.48.16, 8.49.09 [ PeopleSoft/JDE ] • Oracle PeopleSoft Enterprise HCM versions 8.8 SP1, 8.9, 9.0 [ PeopleSoft/JDE ] • Oracle Siebel SimBuilder versions 7.8.2, 7.8.5 [ Siebel ] Category II Products and components that are bundled with the products listed in Category I. No products in this category are affected by the fixes included in this Critical Patch Update. Category III Products that are de-supported as a standalone installation but are supported when installed with the products listed in Category I: • Oracle Database 9i, version 9.0.1.5 FIPS+ [ Application Server ] • Oracle Application Server 9i Release 1, version 1.0.2.2 [ E-Business Suite ] Patches for Category III products are only available when these products are installed as part of Category I products, and are tested solely on supported configurations and environments. Please refer to the documentation for each product for specific details concerning the support and availability of patches. Patch Availability Table and Risk Matrices The Oracle Database, Oracle Application Server, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications (Release 12 only), JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools and Siebel Enterprise patches in the Updates are cumulative; patches for any product included in a Critical Patch Update will include all fixes for that product from the previous Critical Patch Updates. Oracle E-Business Suite Applications Release 11i patches are not cumulative, so Oracle E-Business Suite Applications customers should refer to previous Critical Patch Updates to identify previous security fixes they want to apply. Oracle Collaboration Suite patches were cumulative up to and including the fixes provided in the April 2007 Critical Patch Update. From the July 2007 Critical Patch Update on, Oracle Collaboration Suite security fixes are delivered using the one-off patch infrastructure normally used by Oracle to deliver single bug fixes to customers. For each Oracle product being administered, please consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2008 Documentation Map, MetaLink Note 558178.1. Product Risk Matrix Patch Availability and Installation Information Oracle Database Appendix A - Oracle Database Risk Matrix Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products, MetaLink Note 552248.1 Oracle Application Server Appendix B - Oracle Application Server Risk Matrix Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products, MetaLink Note 552248.1 Oracle Collaboration Suite Appendix C - Oracle Collaboration Suite Risk Matrix Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products, MetaLink Note 552248.1 Oracle E-Business Suite and Applications Appendix D - Oracle E-Business Suite and Applications Risk Matrix E-Business Suite Critical Patch Update Note, MetaLink Note 557157.1 Oracle Enterprise Manager Appendix E - Enterprise Manager Risk Matrix Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products, MetaLink Note 552248.1 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Appendix F - Oracle PeopleSoft and JD Edwards Applications Risk Matrix Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Advisories Oracle Siebel Enterprise Appendix G - Oracle Siebel Enterprise Risk Matrix Oracle Siebel Enterprise Support Risk Matrix Content Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories. Several vulnerabilities addressed in this Critical Patch Update affect multiple products. The same vulnerability appears with the same Vuln # in all risk matrices. Italics indicate vulnerabilities in code included from other product areas. Security vulnerabilities are scored using CVSS version 2.0 (see Oracle CVSS Scoring). Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose information about the security analysis, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential result of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit. Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the CPU or Security Alert notification, the Patch Availability Matrix, the readme files, and FAQs. Oracle does not provide advance notification on CPUs or Security Alerts to individual customers. Finally, Oracle does not distribute exploit code or “proof-of-concept” code for product vulnerabilities. Workarounds Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply fixes as soon as possible. Depending on your environment, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long- term solution as neither corrects the underlying problem. Unsupported Products and De-Supported Versions Unsupported products, releases and versions are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier patch sets of affected releases are also affected by these vulnerabilities. Critical Patch Update patches are not provided for product versions that are no longer covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers upgrade to the latest supported version of Oracle products in order to obtain patches. Extended Support Phase: Critical Patch Update patches are available to customers who have purchased Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to be able to download Critical Patch Update patches for products in the Extended Support Phase. Critical Patch Update patches may not be downloaded to update products supported with Sustaining Support, or to update any unsupported products. Supported Database, Fusion Middleware and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in MetaLink Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support. On Request Model for Oracle Database and Oracle Application Server Oracle will proactively create patches only for platform/version combinations that, based on historical data, customers are likely to download for the next Critical Patch Update. We create patches for historically inactive platform/version combinations of the Oracle Database and Oracle Application Server only if requested by customers. Fixes for the vulnerabilities will continue to be included in future releases and patch sets. Additional details regarding the products, versions and platforms that will be supported for the next Critical Patch Update and the process for requesting On Request patches are available in Section 4.10 (Planned Patches for Next CPU release) of the Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products (MetaLink Note 552248.1). Credits The following people or organizations discovered and brought security vulnerabilities addressed by this Critical Patch Update to Oracle's attention: Cesar Cerrudo of Argeniss; Esteban Martinez Fayo of Application Security, Inc.; Joxean Koret working with iDefense VCP; Alexander Kornbrust of Red Database Security; Stephen Kost of Integrigy; Ali Kumcu of inTellectPro; Amichai Shulman of Imperva, Inc., Sumit Siddharth of Portcullis Computer Security Limited and Paul M. Wright, formerly of NGS Software. Critical Patch Update Schedule Critical Patch Updates are released on the Tuesday closest to the 15th day of January, April, July and October. The next four dates are: 15 July 2008 14 October 2008 13 January 2009 14 April 2009 References Oracle Critical Patch Updates and Security Alerts main page [ Oracle Technology Network ] Oracle PeopleSoft Security main page [ Customer Connection ] Critical Patch Update - April 2008 Documentation Map [ MetaLink Note 558178.1 ] Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions [ MetaLink Note 360470.1 ] [ Customer Connection ] Risk Matrix definitions [ Risk Matrix Definitions ] Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS Scoring ] List of public vulnerabilities fixed in Critical Patch Updates and Security Alerts [ Oracle Technology Network ] Software Error Correction Support Policy [ [MetaLink Note 209768.1 ] Modification History 2008-APR-16 Changed version number in 'Upgrading Application Express' section to 3.1. Also changed the columns of Application Express Risk Matrix 2008-APR-15 Initial release Appendix A - Oracle Database Oracle Database Executive Summary This Critical Patch Update contains a total of 17 new security fixes for Oracle Database products, divided as follows: 15 new security fixes for the Oracle Database. 1 of these database vulnerabilities may be remotely exploitable without authentication, i.e. may be exploited over a network without the need for a username and password. No new security fixes are applicable to Oracle Database client-only installations, i.e. installations that do not have the Oracle Database installed. 1 new security fix for Oracle Secure Enterprise Search, which is a separate product that is not installed with the Oracle Database. 2 new security fixes for Oracle Application Express (formerly called HTML DB). 1 of these vulnerabilities may be remotely exploitable without authentication, i.e. may be exploited over a network without the need for a username and password. No new security fixes for the following products: Oracle Audit Vault, which is a separate product that is not installed with the Oracle Database. Oracle HTTP Server, which is installed by default with Oracle Database 9i Release 2. For Oracle Database versions 10g and higher, Oracle HTTP Server is on the Companion CD, is separately installable, and is not installed with the Database. Oracle recommends that customers apply this Critical Patch Update to Oracle HTTP Server installations that are affected by vulnerabilities fixed in prior Critical Patch Updates if the prior patches have not been applied. If Oracle HTTP Server has not been installed, this software will not be present and the Oracle HTTP Server patches are not required. Oracle Database Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability EM01 Oracle Enterprise Manager Local None No 6.6 Local Medium Single Complete Complete Complete 9.0.1.5+ DB01 Advanced Queuing Oracle Net Execute on SYS.DBMS_AQ No 5.5 Network Low Single Partial Partial None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB02 Change Data Capture Oracle Net Execute on DBMS_CDC_UTILITY No 5.5 Network Low Single Partial+ Partial+ None 10.1.0.5, 10.2.0.3, 11.1.0.6 DB03 Core RDBMS HTTP Create Session No 5.5 Network Low Single Partial+ Partial+ None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB04 Oracle Secure Enterprise Search or Ultrasearch Oracle Net Execute on WKSYS.WK_QRY or WKSYS.WK_QUERYAPI No 5.5 Network Low Single Partial+ Partial+ None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB05 Oracle Spatial Oracle Net Execute on SDO_UTIL No 5.5 Network Low Single Partial Partial None 10.1.0.5, 10.2.0.3 DB06 Oracle Spatial Oracle Net Execute on SDO_GEOM No 5.5 Network Low Single Partial Partial None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB07 Oracle Spatial Oracle Net Execute on SDO_IDX No 5.5 Network Low Single Partial Partial None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, 11.1.0.6 See Note 1 DB08 Authentication Oracle Net None Yes 5.0 Network Low None Partial None None 11.1.0.6 DB09 Oracle Net Services Local None No 4.6 Local Low None Partial+ Partial+ Partial+ 9.2.0.8, 10.1.0.5, 10.2.0.3 See Note 2 DB10 Core RDBMS Oracle Net Create Session No 4.0 Network Low Single Partial+ None None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, 11.1.0.6 See Note 1 DB11 Data Pump Oracle Net Execute on KUPF$FILE_INT No 4.0 Network Low Single None None Partial 9.2.0.8, 10.1.0.5, 10.2.0.3, 11.1.0.6 See Note 2 DB12 Export Oracle Net None No 4.0 Network Low Single Partial+ None None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB13 Query Optimizer Oracle Net Execute on DBMS_STATS No 4.0 Network Low Single None Partial None 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3 See Note 1 DB14 Audit Oracle Net Insert on a table subject to fine grained auditing No 3.5 Network Medium Single None Partial None 10.1.0.5, 10.2.0.3 DB15 Advanced Queuing Oracle Net Execute on SYS.DBMS_AQJMS_INTERNAL No 2.1 Network High Single None None Partial 9.0.1.5+, 10.1.0.5 See Note 1 Notes: 9.0.1.5+ refers to Oracle Database 9i, version 9.0.1.5 FIPS+, which is used only in conjunction with Oracle Application Server 10g (9.0.4), version 9.0.4.3. This vulnerability affects only Windows platforms. Oracle Database Client-only Installations No new vulnerabilities affect Oracle Database client-only installations (installations that do not have the Oracle Database installed). Oracle Secure Enterprise Search Oracle Secure Enterprise Search 10g is a standalone product that enables searching across a corporation's enterprise information assets. Unless you installed the Oracle Secure Enterprise Search product, it will not be present on your system and no further action is required. The security vulnerabilities listed in the risk matrix above are fixed in Oracle Secure Enterprise Search 10g, version 10.1.8.3. Customers on previous versions of Secure Enterprise Search should upgrade to version 10.1.8.3 or later. Instructions on upgrading Oracle Secure Enterprise Search can be found in the Online Documentation. This, and the software to install, is referenced from the Oracle Technology Network Secure Enterprise Search page. Oracle Secure Enterprise Search 10g includes Oracle Database 10g version 10.1.0.5, and since vulnerabilities affecting this Database version may affect Oracle Secure Enterprise Search, Oracle recommends that customers apply the April 2008 Critical Patch Update to the embedded Database. Oracle Audit Vault Oracle Audit Vault 10g is a standalone product that collects and analyzes audit data from multiple systems. Unless you installed the Oracle Audit Vault product, it will not be present on your system and no further action is required. Oracle Audit Vault has no security vulnerabilities listed in this or previous Critical Patch Update advisories. Customers on previous versions of Audit Vault should upgrade to version 10.2.2.1 or later. Information about Oracle Audit Vault can be found in the Online Documentation. This, and the Audit Vault software to install, is referenced from the Oracle Technology Network Audit Vault page. Oracle Audit Vault 10g includes Oracle Database 10g version 10.2.0.3, and vulnerabilities affecting this Database version may affect Oracle Audit Vault. Oracle recommends that all Oracle Audit Vault customers review the Critical Patch Update April 2008 Availability Information for Oracle Database and Fusion Middleware Products, MetaLink Note 552248.1 before applying the April 2008 Critical Patch Update to the embedded Database. Oracle Application Express Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability APEX01 Oracle Application Express Oracle Net Execute on flows_030000.wwv_execute_ immediate No 5.5 Network Low Single Partial+ Partial+ None 3.0.1 APEX02 Oracle Application Express HTTP None Yes 4.0 Network High None Partial Partial None 3.0.1 Overview of Oracle Application Express Oracle Application Express is a rapid web application development tool for the Oracle Database. Unless you separately installed Oracle Application Express from a Companion CD supplied with the Oracle Database CD set or from a package downloaded from an Oracle web site, it will not be present on your system and no further action is required. To check for the presence of Application Express on a system, run the following command from a SQL prompt as SYS: select username from dba_users where username in ('FLOWS_010500','FLOWS_010600', 'FLOWS_020000','FLOWS_020200','FLOWS_030000', 'FLOWS_030100'); If the result is 'no rows selected' then no version of the product is installed and no further action is required. Other output indicates Oracle Application Express is installed, even if it is not actively in use. Upgrading Oracle Application Express The Oracle Application Express security vulnerabilities listed in the risk matrix above are fixed in version 3.1. All previous versions should be upgraded directly to version 3.1 or later. Instructions on upgrading and the software to install the latest version of Oracle Application Express can be found on: http://www.oracle.com/technology/products/database/application_express/download.html Appendix B - Oracle Application Server Oracle Application Server Executive Summary This Critical Patch Update contains 3 new security fixes for Oracle Application Server. All 3 of these vulnerabilities may be remotely exploitable without authentication, i.e. they may be exploited over a network without the need for a username and password. 1 of these security fixes, the one with the CVSS of 9.3, is applicable to client-only installations, and affects only the client portion of Oracle Application Server. Oracle Application Server products that are bundled with the Oracle Database are affected by the vulnerabilities listed in the Oracle Database section. They are not discussed further in this section and are not listed in the Oracle Application Server risk matrix. Oracle Application Server Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability AS01 Oracle Jinitiator HTTP None Yes 9.3 Network Medium None Complete Complete Complete 1.3.1.14 See Note 1 EM01 Oracle Enterprise Manager Local None No 6.6 Local Medium Single Complete Complete Complete 1.0.2.2 DB04 Oracle Secure Enterprise Search or Ultrasearch Oracle Net Execute on WKSYS.WK_QRY or WKSYS.WK_QUERYAPI No 5.5 Network Low Single Partial+ Partial+ None 9.0.4.3, 10.1.2.2 AS02 Oracle Dynamic Monitoring Service HTTP None Yes 4.3 Network Medium None None Partial None 9.0.4.3, 10.1.2.2, 10.1.3.3 AS03 Oracle Portal HTTP None Yes 4.3 Network Medium None None Partial None 9.0.4.3 Notes: The impact of this vulnerability is limited to Jinitiator; there is no Oracle Application Server impact. Oracle Jinitiator versions 1.3.1.15 and later are not affected. Oracle Application Server Client-only Installations AS01 affects Oracle Application Server client-only installations. Appendix C - Oracle Collaboration Suite Oracle Collaboration Suite Executive Summary There are no new Oracle Collaboration Suite specific fixes in this Critical Patch Update. This Critical Patch Update contains no new fixes to Oracle Application Server vulnerabilities that are in code included in Oracle Collaboration Suite. Due to Oracle Collaboration Suite custom files, the steps in MetaLink Note 445172.1 are required to apply the April 2008 Critical Patch Update. Oracle Collaboration Suite bundles the Oracle Database. All the security fixes listed in the Oracle Database part of the Oracle Database section are applicable. The Oracle Collaboration Suite documentation referenced from this advisory lists the patches that should be installed on Oracle Collaboration Suite instances to fix these Oracle Database issues. Oracle Collaboration Suite Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability DB04 Oracle Secure Enterprise Search or Ultrasearch Oracle Net Execute on WKSYS.WK_QRY or WKSYS.WK_QUERYAPI No 5.5 Network Low Single Partial+ Partial+ None 10.1.2 Appendix D - Oracle E-Business Suite and Applications Oracle E-Business Suite and Applications Executive Summary This Critical Patch Update contains 11 new security fixes for the Oracle E-Business Suite. 7 of these vulnerabilities may be remotely exploited without authentication, i.e. they may be exploited over a network without the need for a username and password. None of these security vulnerabilities affects Oracle E-Business Suite client-only installations. Oracle E-Business Suite 11i includes Oracle9i Application Server, version 1.0.2.2 code, including Oracle Reports Developer. None of the Oracle Application Server vulnerabilities fixed in this Critical Patch Update affect this version. Oracle E-Business Suite products include an Oracle Database which is affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database version being used. Oracle Database vulnerabilities are not listed in the Oracle E-Business Suite risk matrix, but since vulnerabilities affecting this Database version may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2008 Critical Patch Update to the embedded Database. There are no new security fixes specific to Oracle Life Sciences Applications (previously known as Oracle Pharmaceutical Applications). However, Oracle Life Sciences Applications includes Oracle Application Server components and Oracle Database software. The exposure of Oracle Life Sciences Applications depends on the versions of Oracle Application Server and the Oracle Database being used. Oracle recommends that customers apply the April 2008 Critical Patch Update to the Oracle Database and Oracle Application Server that are included in Oracle Life Sciences Applications. Please refer to the Oracle Application Server and Oracle Database sections for more information. Oracle Life Sciences Applications customers should refer to MetaLink Note 557159.1 for detailed information on applying the Critical Patch Update to the Oracle Database and Application Server components. Oracle E-Business Suite Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability APP01 Oracle Advanced Pricing HTTP None Yes 5.0 Network Low None Partial None None 11.5.10.2 APP02 Oracle Advanced Pricing HTTP None Yes 5.0 Network Low None Partial None None 11.5.10.2, 12.0.4 APP03 Oracle Advanced Pricing HTTP None Yes 5.0 Network Low None None Partial None 11.5.10.2, 12.0.4 APP04 Oracle Application Object Library HTTP None Yes 5.0 Network Low None None None Partial+ 11.5.10.2, 12.0.4 APP05 Oracle Applications Framework HTTP None Yes 5.0 Network Low None Partial None None 11.5.10.2 APP06 Oracle Applications Manager HTTP None Yes 5.0 Network Low None Partial None None 11.5.10.2, 12.0.4 APP07 Oracle Application Object Library HTTP None Yes 4.3 Network Medium None None Partial None 11.5.10.2, 12.0.4 APP08 Oracle Applications Technology Stack HTTP Valid Session No 4.0 Network Low Single Partial None None 11.5.10.2, 12.0.4 APP09 Oracle Advanced Pricing HTTP Valid Session No 3.5 Network Medium Single None Partial None 11.5.10.2, 12.0.4 APP10 Oracle Advanced Pricing HTTP Valid Session No 3.5 Network Medium Single None Partial None 11.5.10.2 APP11 Oracle Application Object Library HTTP Valid Session No 3.5 Network Medium Single None Partial None 11.5.10.2, 12.0.4 Appendix E - Oracle Enterprise Manager Oracle Enterprise Manager Executive Summary This Critical Patch Update contains 1 new security fix for Oracle Enterprise Manager. This vulnerability may not be remotely exploited without authentication, i.e. it may not be exploited over a network without the need for a username and password. Oracle Enterprise Manager 10g Grid Control includes Oracle Database and Oracle Application Server components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Application Server sections. The exposure of a particular instance of Oracle Enterprise Manager depends on the Oracle Database and Oracle Application Server versions being used. Oracle recommends that customers apply the April 2008 Critical Patch Update to the embedded Oracle Database and Oracle Application Server. Releases of Oracle Enterprise Manager before Oracle Enterprise Manager 10g Grid Control include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of a particular instance of Oracle Enterprise Manager depends on the Oracle Database version being used. Oracle recommends that customers apply the April 2008 Critical Patch Update to the embedded Oracle Database. Oracle Enterprise Manager Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability EM01 Oracle Enterprise Manager Local None No 6.6 Local Medium Single Complete Complete Complete See note. See Note 1 Notes: The fix is included in AS versions after 1.0.2.2 and Database versions after 9.0.1.5. Appendix F - Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Executive Summary This Critical Patch Update contains 3 new security fixes for the PeopleSoft-JDEdwards Suite. None of these vulnerabilities may be remotely exploited without authentication, i.e. may be exploited over a network without the need for a username and password. Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability PSE01 PeopleSoft PeopleTools HTTP Valid Session No 4.0 Network Low Single None Partial None 8.22.19, 8.48.16, 8.49.09 PSE02 PeopleSoft HCM Recruiting HTTP Valid Session No 3.2 Local Low Single Partial Partial None 8.8 SP1 PSE03 PeopleSoft HCM ePerformance HTTP Valid Session No 3.2 Local Low Single Partial+ Partial+ None 8.9, 9.0 Appendix G - Oracle Siebel Enterprise Oracle Siebel Enterprise Executive Summary This Critical Patch Update contains 6 new security fixes for the Oracle Siebel Enterprise Suite. 3 of these vulnerabilities may be remotely exploited without authentication, i.e. may be exploited over a network without the need for a username and password. All 6 security fixes are for the SimBuilder component. SimBuilder is a standalone component used to prepare and deliver training course materials. If you have not installed Oracle Siebel SimBuilder, then no further action is required. Oracle Siebel Enterprise Risk Matrix Vuln# Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Last Affected Patch set (per Supported Release) Notes Base Score Access Vector Access Complexity Authentication Confidentiality Integrity Availability SEBL01 Siebel SimBuilder HTTP Server Administrator Yes 6.4 Network Low None Partial Partial None 7.8.2, 7.8.5 SEBL02 Siebel SimBuilder HTTP None Yes 6.4 Network Low None Partial Partial None 7.8.2, 7.8.5 SEBL03 Siebel SimBuilder HTTP None Yes 5.1 Network High None Partial+ Partial+ Partial+ 7.8.2, 7.8.5 SEBL04 Siebel SimBuilder HTTP None No 4.0 Network Low Single Partial None None 7.8.2, 7.8.5 SEBL05 Siebel SimBuilder HTTP None No 1.7 Local Low Single Partial None None 7.8.2, 7.8.5 SEBL06 Siebel SimBuilder HTTP None No 1.7 Local Low Single Partial None None 7.8.2, 7.8.5 [***** End cpuapr2008 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Oracle for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) S-213: Nukedit 'email' Parameter Vulnerability S-214: SurgeMail and WebMail 'Page' Command Vulnerability S-215: Symantec Backup Exec Scheduler ActiveX Control Multiple Vulnerabilities S-216: Juniper Networks Secure Access 2000 'rdremediate.cgi' Vulnerability S-217: Drupal Multiple HTML Vulnerabilities S-218: gd Security Update S-219: Juniper Networks Secure Access 2000 Web Root Path Vulnerability S-220: PHP-Nuke My_eGallery Module 'gid' Parameter Vulnerability S-221: Learn2 STRunner ActiveX Control Vulnerabilities S-222: Evolution Security Update