Oracle Critical Patch Update for October Contains 180 Fixes
Oracle addresses 180 CVEs across 219 security patches in October’s Critical Patch Update, including a critical vulnerability in Oracle NoSQL Database.
On October 15, Oracle released its Critical Patch Update (CPU) for October 2019 as part of its quarterly release of fixes for vulnerabilities. This update contains fixes for 180 CVEs in 219 patches across several Oracle products. The following is the full list of product families with vulnerabilities addressed in this month’s release:
- Oracle Construction and Engineering
- Oracle Database Server
- Oracle E-Business Suite
- Oracle Enterprise Manager
- Oracle Financial Services Applications
- Oracle Food and Beverage Applications
- Oracle Fusion Middleware
- Oracle GraalVM
- Oracle Health Sciences Applications
- Oracle Hospitality Applications
- Oracle Hyperion
- Oracle JD Edwards
- Oracle Java SE
- Oracle MySQL
- Oracle NoSQL Database
- Oracle PeopleSoft
- Oracle Policy Automation
- Oracle Retail Applications
- Oracle Siebel CRM
- Oracle Supply Chain
- Oracle Support Tools
- Oracle Systems
- Oracle Virtualization
This quarter’s CPU also contains 18 CVSS 9+ vulnerabilities; exploitation of these vulnerabilities can either result in unauthenticated access or full takeover of vulnerable assets. Here we describe in more detail some of the CVSS 9+ scored CVEs:
Oracle NoSQL Database | CVE-2018-14721
One of the most notable patches this month addresses CVE-2018-14721, a vulnerability in Oracle NoSQL Database affecting all versions prior to 19.3.12. The vulnerability exists within the jackson-databind NoSQL component. An unauthenticated attacker with network access via HTTP could exploit this vulnerability to take over an Oracle NoSQL Database. This vulnerability has been addressed before in other Oracle products, including in Oracle’s January 2019 CPU.
Oracle MySQL | CVE-2019-8457
CVE-2019-8457 is a heap out-of-bounds read vulnerability in the SQLite component of Oracle MySQL which could allow an unauthenticated attacker to compromise and take over MySQL Workbench. Versions of Oracle MySQL 8.0.17 and prior are affected.
Oracle Enterprise Manager | CVE-2016-4000
CVE-2016-4000 is a vulnerability in Oracle Enterprise manager which could allow an unauthenticated attacker to send a malicious HTTP request to fully take over a vulnerable host. The flaw exists in the Jython component of Oracle Enterprise Manager and could allow an attacker to execute arbitrary code using a crafted serialized PyFunction object.
Oracle Construction and Engineering | CVE-2017-6056, CVE-2019-14379, CVE-2019-14379, and CVE-2019-3020
CVE-2017-6056 relates to Instantis Enterprise, while the remaining CVEs are vulnerabilities found in Primavera. For each of these CVEs, an unauthenticated attacker could send a malicious HTTP request to the vulnerable components and fully take over or perform admin actions on exploited targets. The Primavera products affected include Primavera P6, Primavera Gateway and Primavera Unifier.
Oracle Middleware | CVE-2016-1000031 & CVE-2019-2904
CVE-2016-1000031 is a remote code execution vulnerability found in Apache Commons FileUpload library, which has been no stranger to Oracle CPUs. This month the flaw is getting patched in the Virtual Directory Server component of Oracle Fusion Middleware. The CVE was first discovered by Tenable Research in 2016 and has since been patched in multiple Oracle Products. This easily exploitable vulnerability can allow an attacker to compromise Oracle Virtual Directory using HTTP requests.
CVE-2019-2904 is an unspecified vulnerability in the ADF Faces component of Oracle JDeveloper and ADF product of Oracle Fusion Middleware. The flaw is described as ‘easily exploitable’ and can allow a remote, unauthenticated attacker to compromise and take over Oracle JDeveloper and ADF with crafted HTTP requests.
Oracle PeopleSoft | CVE-2016-0729, CVE-2019-3862
CVE-2016-0729 are multiple critical buffer overflow vulnerabilities in the XML Parser library in Apache Xerces-C that was originally patched in 2016. This vulnerability exists in the Integration Broker in Oracle PeopleSoft. It could allow a remote, unauthenticated attacker to cause a denial of service.
CVE-2019-3862 is an out-of-bounds read vulnerability in libssh2 due to improper parsing of exit status messages with no payload in SSH_MSG_CHANNEL_REQUEST packets. The vulnerability was patched in March 2019. This vulnerability exists in the File Processing function of Oracle PeopleSoft.
Customers are advised to apply all relevant patches provided by Oracle in this CPU. Please refer to the October 2019 advisory for full details.
Identifying affected systems
A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.
Get more information
- Oracle Critical Patch Update Advisory - October 2019
- Oracle Advisory to CVE Map
- October 2019 CPU Risk Matrix Page
Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.
Get a free 60-day trial of Tenable.io Vulnerability Management.
- Threat Intelligence
- Threat Management
- Vulnerability Management
- Vulnerability Scanning
Are You Vulnerable to the Latest Exploits?
Enter your email to receive the latest cyber exposure alerts in your inbox.