{"id":5207,"date":"2017-04-19T10:54:25","date_gmt":"2017-04-19T09:54:25","guid":{"rendered":"http:\/\/www.onomi.co.uk\/?p=5207"},"modified":"2018-08-21T11:19:13","modified_gmt":"2018-08-21T10:19:13","slug":"oracle-patch-update-april-17","status":"publish","type":"post","link":"http:\/\/content.n4stack.io\/2017\/04\/19\/oracle-patch-update-april-17\/","title":{"rendered":"Oracle Patch Update April 17"},"content":{"rendered":"
[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid” background_position=”top_left” background_repeat=”repeat” background_size=”initial”]<\/p>\n
Oracle have released their latest critical patch update for Database Server yesterday evening\u00a0(18\/4).\u00a0<\/strong>This Oracle Critical Patch Update includes 2 new security fixes for Oracle\u00a0Database and fix for a high scoring vulnerability for Oracle Secure Back up. These updates are available for the below supported versions:<\/p>\n <\/p>\n [\/et_pb_text][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2017\/04\/Oracle-Patch01.jpg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”off” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” use_border_color=”off” border_color=”#ffffff” border_style=”solid” animation_style=”none” animation_duration=”1000ms” animation_intensity_slide=”50%” show_bottom_space=”on” _builder_version=”3.6″ \/][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2017\/04\/Oracle-Patch02.jpg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”off” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” use_border_color=”off” border_color=”#ffffff” border_style=”solid” animation_style=”none” animation_duration=”1000ms” animation_intensity_slide=”50%” show_bottom_space=”on” \/][et_pb_text background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid” background_position=”top_left” background_repeat=”repeat” background_size=”initial”]<\/p>\n The Oracle Secure Backup\/ PHP nasty is exploitable remotely, without the need for authentication. ext\/session\/session.c in certain versions of PHP does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.<\/p>\n\n