{"id":4609,"date":"2016-07-20T11:53:58","date_gmt":"2016-07-20T10:53:58","guid":{"rendered":"http:\/\/www.onomi.co.uk\/?p=4609"},"modified":"2018-08-21T11:13:18","modified_gmt":"2018-08-21T10:13:18","slug":"oracle-patch-update-july-2016","status":"publish","type":"post","link":"http:\/\/content.n4stack.io\/2016\/07\/20\/oracle-patch-update-july-2016\/","title":{"rendered":"Oracle Patch Update July 2016"},"content":{"rendered":"
[et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n
Oracle have released their latest critical patch update for Database Server yesterday (19\/7).\u00a0This Oracle Critical Patch Update includes seven new security fixes for Oracle\u00a0Database impacting the below supported versions:<\/p>\n
Importantly three of these vulnerabilities may be exploitable remotely without authentication, this means that they\u00a0may be exploited over a network without the need for u\/name &\u00a0password credentials. These are CVE-2016-3506,\u00a0CVE-2016-347 and CVE-2015-0204 which relate to the JDBC, Portable Clusterware\u00a0and the core RDMBS component respectively. The highest scoring vulnerability CVE-2016-3609 is for Oracle’s JVM, rated as 9.0 (Windows OS). In addtion there are a couple of exploits associates with Application Express.<\/p>\n