{"id":51449,"date":"2017-07-19T09:33:04","date_gmt":"2017-07-19T08:33:04","guid":{"rendered":"http:\/\/www.onomi.co.uk\/?p=5537"},"modified":"2018-08-21T11:19:12","modified_gmt":"2018-08-21T10:19:12","slug":"oracle-patch-update-july-17","status":"publish","type":"post","link":"http:\/\/content.n4stack.io\/2017\/07\/19\/oracle-patch-update-july-17\/","title":{"rendered":"Oracle Patch Update July 2017 (Database Server)"},"content":{"rendered":"
[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” text_orientation=”left” border_style=”solid” _builder_version=”3.6″]<\/p>\n
Oracle have released their latest critical patch update for Database Server yesterday evening\u00a0(18\/7).\u00a0<\/strong>This Oracle Critical Patch Update includes 4 new security fixes for Oracle\u00a0Database and a vulnerability for Oracle REST Data services (formerly Application Express listener).\u00a0 These updates are available for the below supported versions:<\/p>\n <\/p>\n [\/et_pb_text][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2017\/08\/Oracle-Database-Vulnerabilities.jpg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”off” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” border_style=”solid” _builder_version=”3.6″ animation_style=”none” animation_duration=”1000ms” animation_intensity_slide=”50%” show_bottom_space=”on” \/][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2017\/08\/Oracle-REST-vulnerabilites.jpg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”off” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” border_style=”solid” _builder_version=”3.6″ animation_style=”none” animation_duration=”1000ms” animation_intensity_slide=”50%” show_bottom_space=”on” \/][et_pb_text background_layout=”light” text_orientation=”left” border_style=”solid” background_position=”top_left” background_repeat=”repeat” background_size=”initial” _builder_version=”3.6″]<\/p>\n The highest scoring vulnerability in OJVM is an easily exploitable vulnerability and allows a low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise OJVM. While the vulnerability is in OJVM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of OJVM. Note: This score is for Windows platforms.<\/p>\n\n