Oracle Critical Patch Update Advisory – January 2018

Oracle Database Server Risk Matrix

This Critical Patch Update contains 5 new security fixes for the Oracle Database Server. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these fixes is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10282 Core RDBMS Create Session, Execute Catalog Role Oracle Net No 9.1 Network Low High None Changed High High High 12.1.0.2, 12.2.0.1
CVE-2018-2680 Java VM Create Session, Create Procedure Multiple Yes 8.3 Network High None Required Changed High High High 11.2.0.4, 12.1.0.2, 12.2.0.1
CVE-2017-12617 WLM (Apache Tomcat) None HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.2.0.1
CVE-2018-2699 Application Express None HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 5.1.4.00.08
CVE-2018-2575 Core RDBMS Local Logon Multiple No 2.0 Network High High Required Un-

changed
Low None None 11.2.0.4, 12.1.0.2, 12.2.0.1 See Note 1

Notes:

  1. Applicable only to Windows platform.

Oracle Database Server Client-Only Installations

The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2018-2575.

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 10 new security fixes for Oracle Communications Applications. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2015-3253 Oracle Communications BRM – Elastic Charging Engine Security (Apache Groovy) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.5
CVE-2017-5645 Oracle Communications BRM – Elastic Charging Engine Security (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.5
CVE-2017-5645 Oracle Communications Convergent Charging Controller Notifications Gateway (Apache Log4j) TCP Yes 9.8 Network Low None None Un-

changed
High High High 6.0
CVE-2017-5645 Oracle Communications Network Charging and Control Notifications Gateway (Apache Log4j) TCP Yes 9.8 Network Low None None Un-

changed
High High High 6.0
CVE-2017-5645 Oracle Communications Services Gatekeeper Security (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.1, 6.0
CVE-2016-5385 Oracle Communications User Data Repository Security (PM&C) Multiple Yes 8.1 Network High None None Un-

changed
High High High 10.x, 12.x
CVE-2018-2570 Oracle Communications Unified Inventory Management Portal HTTP No 6.3 Network Low Low None Un-

changed
Low Low Low 7.2.4.2.x, 7.3
CVE-2018-2567 Oracle Communications Order and Service Management Portal HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.2.4.1.x, 7.2.4.2.x, 7.3.0.x.x, 7.3.0.1.x
CVE-2013-2566 Oracle Communications Application Session Controller Security TLS Yes 5.9 Network High None None Un-

changed
High None None 3.x
CVE-2018-2571 Oracle Communications Unified Inventory Management Portal HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 7.2.4.2.x, 7.3

Additional CVEs addressed are below:

  • The fix for CVE-2013-2566 also addresses CVE-2015-2808.
  • The fix for CVE-2015-3253 also addresses CVE-2016-6814.
  • The fix for CVE-2016-5385 also addresses CVE-2016-2518, CVE-2016-2550, CVE-2016-4449, CVE-2016-5387 and CVE-2016-7977.

Oracle Construction and Engineering Suite Risk Matrix

This Critical Patch Update contains 1 new security fix for the Oracle Construction and Engineering Suite. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2620 Primavera Unifier Platform HTTP No 8.1 Network Low Low None Un-

changed
High High None 10.x, 15.x, 16.x, 17.x

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 7 new security fixes for the Oracle E-Business Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2018 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2018), My Oracle Support Note 2334374.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2656 Oracle General Ledger Data Manager Server HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2018-2655 Oracle Work in Process Assemble/Configure to Order HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-3736 Application Server Tech Stack (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 12.1.3
CVE-2018-2691 Oracle User Management Proxy User Delegation HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2018-2684 Oracle User Management Registration Process HTTP No 4.9 Network Low High None Un-

changed
High None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2018-2635 Oracle Application Object Library Login HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2018-2580 Oracle Applications DBA ADPatch None No 4.4 Local Low High None Un-

changed
High None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7

Additional CVEs addressed are below:

  • The fix for CVE-2017-3736 also addresses CVE-2017-3735.

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 34 new security fixes for Oracle Financial Services Applications. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2706 Oracle Banking Corporate Lending Core module HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.3.0, 12.4.0
CVE-2018-2705 Oracle Banking Payments Payments Core HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.3.0, 12.4.0
CVE-2018-2648 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0
CVE-2018-2707 Oracle Banking Corporate Lending Core module HTTP No 8.1 Network Low Low None Un-

changed
None High High 12.3.0, 12.4.0
CVE-2018-2704 Oracle Banking Payments Payments Core HTTP No 8.1 Network Low Low None Un-

changed
None High High 12.3.0, 12.4.0
CVE-2018-2723 Oracle Financial Services Asset Liability Management User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 6.1.x, 8.0.x
CVE-2018-2592 Oracle Financial Services Balance Sheet Planning User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.x
CVE-2018-2729 Oracle Financial Services Funds Transfer Pricing User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 6.1.x, 8.0.x
CVE-2018-2725 Oracle Financial Services Hedge Management and IFRS Valuations User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.x
CVE-2018-2720 Oracle Financial Services Liquidity Risk Management User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.x
CVE-2018-2724 Oracle Financial Services Loan Loss Forecasting and Provisioning User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.x
CVE-2018-2726 Oracle Financial Services Market Risk User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.x
CVE-2018-2727 Oracle Financial Services Market Risk Measurement and Management User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.5
CVE-2018-2721 Oracle Financial Services Price Creation and Discovery User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.0.5
CVE-2018-2679 Oracle Financial Services Profitability Management User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 6.1.x, 8.0.x
CVE-2018-2649 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 8.1 Network Low Low None Un-

changed
None High High 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0
CVE-2018-2660 Oracle Financial Services Analytical Applications Infrastructure Core HTTP No 7.4 Network Low Low None Changed Low Low Low 7.3.5.x, 8.0.x
CVE-2018-2661 Oracle Financial Services Analytical Applications Infrastructure Core HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.3.5.x, 8.0.x
CVE-2018-2732 Oracle Financial Services Analytical Applications Reconciliation Framework User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2692 Oracle Financial Services Asset Liability Management User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.1.x, 8.0.x
CVE-2018-2626 Oracle Financial Services Balance Sheet Planning User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2728 Oracle Financial Services Funds Transfer Pricing User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.1.x, 8.0.x
CVE-2018-2719 Oracle Financial Services Hedge Management and IFRS Valuations User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2682 Oracle Financial Services Liquidity Risk Management User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2712 Oracle Financial Services Loan Loss Forecasting and Provisioning User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2714 Oracle Financial Services Market Risk User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.x
CVE-2018-2716 Oracle Financial Services Market Risk Measurement and Management User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.5
CVE-2018-2722 Oracle Financial Services Price Creation and Discovery User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.5
CVE-2018-2670 Oracle Financial Services Profitability Management User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.1.x, 8.0.x
CVE-2018-2674 Oracle FLEXCUBE Direct Banking Logoff HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.0.2, 12.0.3
CVE-2018-2630 Oracle FLEXCUBE Universal Banking Security Management System HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 11.5.0, 11.6.0, 11.7.0
CVE-2018-2709 Oracle Banking Corporate Lending Core module HTTP No 5.3 Network High Low None Un-

changed
High None None 12.3.0, 12.4.0
CVE-2018-2708 Oracle Banking Payments Payments Core HTTP No 5.3 Network High Low None Un-

changed
High None None 12.3.0, 12.4.0
CVE-2018-2614 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.3 Network High Low None Un-

changed
High None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 27 new security fixes for Oracle Fusion Middleware. 21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the January 2018 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2018 Patch Availability Document for Oracle Products, My Oracle Support Note 2325393.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10352 Oracle WebLogic Server WLS – Web Services HTTP Yes 9.9 Network Low None None Changed Low Low High 12.2.1.3.0
CVE-2017-5461 Oracle Directory Server Enterprise Edition Admin Console (Sun Security Libraries) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.1.1.7.0
CVE-2017-5461 Oracle iPlanet Web Server Security (NSS) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 7.0
CVE-2017-5645 Oracle WebLogic Server Sample apps (Apache Log4j) TCP/UDP Yes 9.8 Network Low None None Un-

changed
High High High 10.3.6.0.0, 12.1.3.0.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2016-0635 Oracle Identity Manager Security HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.2.3.0
CVE-2015-7501 Oracle Identity Manager Connector CA ACF2 (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 9.0.4.20.6, 9.0.4.21.0, 9.0.4.25.4
CVE-2015-7501 Oracle Identity Manager Security (Apache Commons Collections) HTTP Yes 8.6 Network Low None None Un-

changed
High Low Low 11.1.2.3.0
CVE-2017-10068 Oracle Business Intelligence Enterprise Edition Analytics Web Dashboards HTTP Yes 8.2 Network Low None Required Changed High Low None 12.2.1.3.0
CVE-2018-2711 Oracle JDeveloper Security Framework HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.2.4, 11.1.1.7.0, 11.1.1.7.1, 11.1.1.9.0, 12.1.3.0.0
CVE-2016-2107 Oracle Mobile Security Suite Internal Development (OpenSSL) HTTPS Yes 8.2 Network Low None None Un-

changed
Low None High 3.0.1
CVE-2018-2564 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed Low High None 11.1.1.9.0
CVE-2018-2596 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed Low High None 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2016-1182 Oracle WebCenter Portal Security Framework (Apache Struts 1) HTTP Yes 8.2 Network Low None None Un-

changed
None Low High 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2018-2713 Oracle WebCenter Portal WebCenter Spaces Application HTTP Yes 8.2 Network Low None Required Changed Low High None 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2017-12617 Oracle Endeca Information Discovery Integrator Other Issues (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 3.1.0, 3.2.0
CVE-2017-12617 Oracle Tuxedo System and Applications Monitor tsam-General (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.1.3.0.0
CVE-2018-2601 Oracle Internet Directory Oracle Directory Services Manager HTTP No 8.0 Network High High None Changed High High High 11.1.1.7.0, 11.1.1.9.0, 12.2.1.3.0
CVE-2017-9798 Oracle HTTP Server Web Listener HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2015-7940 Oracle WebCenter Portal Security Framework (Bouncy Castle Java package) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2018-2715 Oracle Business Intelligence Enterprise Edition BI Platform Security HTTP No 6.5 Network Low Low None Un-

changed
High None None 12.2.1.2.0, 12.2.1.3.0
CVE-2017-10262 Oracle Access Manager Web Server Plugin HTTPS Yes 5.9 Network High None None Un-

changed
High None None 11.1.2.3.0
CVE-2017-3732 Oracle Access Manager Web Server Plugin (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 10.1.4.3.0
CVE-2016-2179 Oracle Business Intelligence Enterprise Edition Analytics Server (OpenSSL) HTTPS Yes 5.3 Network Low None None Un-

changed
None None Low 11.1.1.7.0, 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2018-2561 Oracle HTTP Server Web Listener HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2018-2625 Oracle WebLogic Server Web Services HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.3.0.0, 12.2.1.3.0, 12.2.1.2.0
CVE-2017-10273 Oracle JDeveloper Deployment None No 4.7 Local High High Required Changed Low Low Low 11.1.1.7.0, 11.1.1.7.1, 11.1.1.9.0, 11.1.2.4.0, 12.1.3.0.0, 12.2.1.2.0
CVE-2018-2584 Oracle WebCenter Sites Advanced UI HTTP No 4.3 Network Low Low None Un-

changed
Low None None 11.1.1.8.0

Additional CVEs addressed are below:

  • The fix for CVE-2015-7501 also addresses CVE-2015-4852.
  • The fix for CVE-2016-1182 also addresses CVE-2014-0114 and CVE-2016-1181.
  • The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106 and CVE-2016-2109.
  • The fix for CVE-2016-2179 also addresses CVE-2016-2107, CVE-2016-2177, CVE-2016-2178, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6306, CVE-2016-7052, CVE-2016-7055, CVE-2017-3731 and CVE-2017-3732.
  • The fix for CVE-2017-3732 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6306, CVE-2016-7052, CVE-2016-7055 and CVE-2017-3731.
  • The fix for CVE-2018-2561 also addresses CVE-2007-6750.

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 7 new security fixes for Oracle Health Sciences Applications. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2613 Oracle Argus Safety Login HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 7.x, 8.0.x, 8.1
CVE-2018-2642 Oracle Argus Safety File Upload HTTP No 6.5 Network Low Low Required Changed Low Low Low 7.x, 8.0.x
CVE-2018-2643 Oracle Argus Safety Case Selection HTTP No 6.4 Network Low Low None Changed Low Low None 7.x, 8.0.x
CVE-2018-2644 Oracle Argus Safety Worklist HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.x, 8.0.x, 8.1
CVE-2017-9072 Oracle Health Sciences Empirica Inspections UI (Calendar) HTTP Yes 6.1 Network Low None Required Changed Low Low None 1.0.1.1
CVE-2017-9072 Oracle Health Sciences Empirica Signal UI (Calendar) HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.0.1.0
CVE-2017-12617 Oracle Health Sciences Empirica Inspections Base (Apache Tomcat) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 1.0.1.1

Additional CVEs addressed are below:

  • The fix for CVE-2017-12617 also addresses CVE-2017-5664.

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 21 new security fixes for Oracle Hospitality Applications. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2697 Oracle Hospitality Cruise Fleet Management Emergency Response System HTTP Yes 9.1 Network Low None None Un-

changed
High High None 9.0.4.0
CVE-2017-0781 MICROS Handheld Terminal MC40 Zebra Handheld unit Bluetooth Yes 8.8 Adjacent

Network
Low None None Un-

changed
High High High Prior to BSP 02.13.0701 (070116)
CVE-2018-2608 Oracle Hospitality Simphony Security HTTP Yes 8.6 Network Low None None Changed High None None 2.7
CVE-2018-2597 Oracle Hospitality Cruise Dining Room Management SilverWhere HTTP Yes 8.2 Network Low None Required Changed High Low None 8.0.78
CVE-2018-2621 Oracle Hospitality Cruise Shipboard Property Management System Mobile Gangway and Mustering HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 7.3.874
CVE-2017-13077 MICROS Handheld Terminal MC40 Zebra Handheld unit WiFi Yes 8.1 Adjacent

Network
Low None None Un-

changed
High High None Prior to BSP 02.13.0701 (070116)
CVE-2017-12617 Oracle Hospitality Guest Access Base (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 4.2.0, 4.2.1
CVE-2018-2666 Oracle Hospitality Labor Management Webservice Endpoint HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.5.1, 9.0.0
CVE-2018-2636 Oracle Hospitality Simphony Security HTTP Yes 8.1 Network High None None Un-

changed
High High High 2.7, 2.8, 2.9
CVE-2018-2701 Oracle Hospitality Cruise Fleet Management Emergency Response System HTTP No 7.6 Network Low Low Required Changed High Low None 9.0.4.0
CVE-2018-2700 Oracle Hospitality Cruise Fleet Management Emergency Response System HTTP Yes 7.5 Network Low None None Un-

changed
High None None 9.0.4.0
CVE-2018-2604 Oracle Hospitality Guest Access Base HTTP Yes 7.5 Network Low None None Un-

changed
High None None 4.2.1
CVE-2018-2589 Oracle Hospitality Simphony Enterprise Server HTTP Yes 7.5 Network Low None None Un-

changed
High None None 2.7, 2.8, 2.9
CVE-2018-2672 Oracle Hospitality Simphony POS HTTP Yes 7.5 Network Low None None Un-

changed
High None None 2.7, 2.8, 2.9
CVE-2018-2683 Oracle Hospitality Simphony POS HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.7, 2.8, 2.9
CVE-2018-2650 Oracle Hospitality Reporting and Analytics Report HTTP No 7.1 Network Low Low None Un-

changed
Low High None 8.5.1, 9.0.0
CVE-2018-2619 Oracle Hospitality Simphony Security HTTP No 6.5 Network Low Low None Un-

changed
High None None 2.7
CVE-2018-2606 Oracle Hospitality Guest Access Base None No 6.2 Local Low None None Un-

changed
High None None 4.2.0, 4.2.1
CVE-2018-2669 Oracle Hospitality Reporting and Analytics Report HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.5.1, 9.0.0
CVE-2018-2673 Oracle Hospitality Simphony POS HTTP Yes 5.9 Network High None None Un-

changed
High None None 2.7, 2.8, 2.9
CVE-2018-2607 Oracle Hospitality Guest Access Base HTTP No 4.9 Network Low High None Un-

changed
None None High 4.2.1

Additional CVEs addressed are below:

  • The fix for CVE-2017-0781 also addresses CVE-2017-0782, CVE-2017-0783 and CVE-2017-0785.
  • The fix for CVE-2017-13077 also addresses CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081 and CVE-2017-13082.

Oracle Hyperion Risk Matrix

This Critical Patch Update contains 4 new security fixes for Oracle Hyperion. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2733 Oracle Hyperion Planning Security HTTP No 7.6 Network High High Required Changed High High High 11.1.2.4.007
CVE-2018-2610 Hyperion Data Relationship Management Access and security HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 11.1.2.4.330
CVE-2018-2594 Hyperion BI+ Foundation UI & Servlets HTTP No 4.3 Network Low High Required Un-

changed
Low Low Low 11.1.2.4
CVE-2018-2595 Hyperion BI+ Foundation UI & Servlets HTTP No 4.3 Network Low High Required Un-

changed
Low Low Low 11.1.2.4

Oracle Java Micro Edition Risk Matrix

This Critical Patch Update contains 1 new security fix for Oracle Java Micro Edition. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2569 Java ME SDK Installer None No 7.8 Local Low None Required Un-

changed
High High High 8.3 See Note 1

Notes:

  1. This applies to the Windows platform only.

Oracle Java SE Risk Matrix

This Critical Patch Update contains 21 new security fixes for Oracle Java SE. 18 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.


The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of “High”, lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.


Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2638 Java SE Deployment Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 8u152, 9.0.1 See Note 1
CVE-2018-2639 Java SE Deployment Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 8u152, 9.0.1 See Note 1
CVE-2018-2633 Java SE, Java SE Embedded, JRockit JNDI Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2627 Java SE Installer None No 7.5 Local High Low Required Changed High High High Java SE: 8u152, 9.0.1 See Note 3
CVE-2018-2637 Java SE, Java SE Embedded, JRockit JMX Multiple Yes 7.4 Network High None None Un-

changed
High High None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 4
CVE-2018-2634 Java SE, Java SE Embedded JGSS Multiple Yes 6.8 Network High None None Changed High None None Java SE: 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151 See Note 1
CVE-2018-2582 Java SE, Java SE Embedded Hotspot Multiple Yes 6.5 Network Low None Required Un-

changed
None High None Java SE: 8u152, 9.0.1; Java SE Embedded: 8u151 See Note 2
CVE-2018-2641 Java SE, Java SE Embedded AWT Multiple Yes 6.1 Network High None Required Changed None High None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151 See Note 1
CVE-2018-2618 Java SE, Java SE Embedded, JRockit JCE Multiple Yes 5.9 Network High None None Un-

changed
High None None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2629 Java SE, Java SE Embedded, JRockit JGSS Multiple Yes 5.3 Network High None Required Un-

changed
None High None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2603 Java SE, Java SE Embedded, JRockit Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2657 Java SE, JRockit Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u171, 7u161; JRockit: R28.3.16 See Note 4
CVE-2018-2599 Java SE, Java SE Embedded, JRockit JNDI Multiple Yes 4.8 Network High None None Un-

changed
None Low Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2581 Java SE JavaFX Multiple Yes 4.7 Network Low None Required Changed Low None None Java SE: 7u161, 8u152, 9.0.1 See Note 1
CVE-2018-2602 Java SE, Java SE Embedded I18n None No 4.5 Local High None Required Un-

changed
Low Low Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151 See Note 1
CVE-2018-2677 Java SE, Java SE Embedded AWT Multiple Yes 4.3 Network Low None Required Un-

changed
None None Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151 See Note 1
CVE-2018-2678 Java SE, Java SE Embedded, JRockit JNDI Multiple Yes 4.3 Network Low None Required Un-

changed
None None Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2588 Java SE, Java SE Embedded, JRockit LDAP Multiple No 4.3 Network Low Low None Un-

changed
Low None None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2663 Java SE, Java SE Embedded, JRockit Libraries Multiple Yes 4.3 Network Low None Required Un-

changed
None None Low Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2
CVE-2018-2675 Java Advanced Management Console Server Multiple Yes 3.7 Network High None None Un-

changed
Low None None Java Advanced Management Console: 2.8
CVE-2018-2579 Java SE, Java SE Embedded, JRockit Libraries Multiple Yes 3.7 Network High None None Un-

changed
Low None None Java SE: 6u171, 7u161, 8u152, 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16 See Note 2

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
  3. This vulnerability applies to the Windows installer only.
  4. This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.

Oracle JD Edwards Products Risk Matrix

This Critical Patch Update contains 2 new security fixes for Oracle JD Edwards Products. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2658 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2
CVE-2018-2659 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2

Oracle MySQL Risk Matrix

This Critical Patch Update contains 25 new security fixes for Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-12617 MySQL Enterprise Monitor Monitoring: General (Apache Tomcat) HTTPS (HTTP over TLS) Yes 8.1 Network High None None Un-

changed
High High High 3.3.6.3293 and prior, 3.4.4.4226 and prior, 4.0.0.5135 and prior
CVE-2018-2585 MySQL Connectors Connector/Net MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 6.9.9 and prior, 6.10.4 and prior
CVE-2018-2696 MySQL Server Server : Security : Privileges MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2562 MySQL Server Server : Partition MySQL Protocol No 7.1 Network Low Low None Un-

changed
None Low High 5.5.58 and prior, 5.6.38 and prior, 5.7.19 and prior
CVE-2018-2583 MySQL Server Stored Procedure MySQL Protocol No 6.8 Network Low High None Changed None None High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2612 MySQL Server InnoDB MySQL Protocol No 6.5 Network Low High None Un-

changed
None High High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2703 MySQL Server Server : Security : Privileges MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2622 MySQL Server Server: DDL MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.58 and prior, 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2573 MySQL Server Server: GIS MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2640 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.58 and prior, 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2665 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.58 and prior, 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2668 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.58 and prior, 5.6.38 and prior, 5.7.20 and prior
CVE-2017-3736 MySQL Connectors Connector/ODBC (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 5.3.9 and prior
CVE-2017-3736 MySQL Enterprise Monitor Monitoring: General (OpenSSL) HTTPS (HTTP over TLS) Yes 5.9 Network High None None Un-

changed
High None None 3.3.6.3293 and prior, 3.4.4.4226 and prior, 4.0.0.5135 and prior
CVE-2017-3737 MySQL Server Server: Packaging (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2647 MySQL Server Server: Replication MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2591 MySQL Server Server : Partition MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.38 and prior, 5.7.19 and prior
CVE-2018-2576 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2586 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2646 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2565 MySQL Server Server: InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2600 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2667 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.20 and prior
CVE-2018-2590 MySQL Server Server: Performance Schema MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.38 and prior, 5.7.20 and prior
CVE-2018-2645 MySQL Server Server: Performance Schema MySQL Protocol No 4.9 Network Low High None Un-

changed
High None None 5.6.38 and prior, 5.7.20 and prior

Additional CVEs addressed are below:

  • The fix for CVE-2017-3736 also addresses CVE-2017-3735.
  • The fix for CVE-2017-3737 also addresses CVE-2017-3738.

Oracle PeopleSoft Products Risk Matrix

This Critical Patch Update contains 15 new security fixes for Oracle PeopleSoft Products. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5645 PeopleSoft Enterprise FIN Supply Chain Portal Pack Argentina Supply Chain Portal Pack (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.1
CVE-2017-5645 PeopleSoft Enterprise FIN Supply Chain Portal Pack Brazil Supply Chain Portal Pack (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.1
CVE-2018-2593 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 8.54, 8.55, 8.56
CVE-2017-10301 PeopleSoft Enterprise PRTL Interaction Hub Enterprise Portal HTTP No 8.1 Network Low Low None Un-

changed
High High None 9.1.00
CVE-2015-7940 PeopleSoft Enterprise HCM Human Resources Install (Bouncy Castle Java package) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 9.1, 9.2
CVE-2018-2652 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2018-2651 PeopleSoft Enterprise PeopleTools XML Publisher HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2018-2702 PeopleSoft Enterprise FSCM Strategic Sourcing HTTP No 6.5 Network Low Low None Un-

changed
High None None 9.2
CVE-2018-2605 PeopleSoft Enterprise PeopleTools Integration Broker HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2018-2695 PeopleSoft Enterprise PeopleTools Query HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2018-2671 PeopleSoft Enterprise SCM Purchasing Supplier Registration HTTP No 6.5 Network Low Low None Un-

changed
High None None 9.2
CVE-2018-2654 PeopleSoft Enterprise HCM Human Resources Company Dir / Org Chart Viewer HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2
CVE-2018-2681 PeopleSoft Enterprise HCM Human Resources Security HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 9.2
CVE-2018-2731 PeopleSoft Enterprise SCM eProcurement Manage Requisition Status HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 9.1, 9.2
CVE-2018-2653 PeopleSoft Enterprise PeopleTools Connected Query HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.54, 8.55, 8.56

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 12 new security fixes for Oracle Retail Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5645 MICROS Relate CRM Software Internal Operations (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.8.x, 11.4.x
CVE-2017-5645 MICROS Retail XBRi Loss Prevention Retail (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1
CVE-2017-5645 Oracle Retail Assortment Planning Application Core (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.1.3, 15.0.3, 16.0.1
CVE-2017-5645 Oracle Retail Convenience and Fuel POS Software OPT Server (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 2.1.132
CVE-2017-5645 Oracle Retail Customer Management and Segmentation Foundation Internal Operations (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 16.0.x
CVE-2017-5645 Oracle Retail Fiscal Management NF Issuing (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.1
CVE-2017-5645 Oracle Retail Workforce Management Configuration Issues (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.60.7, 1.64.0
CVE-2016-0635 Converged Commerce Foundation Data HTTP No 8.8 Network Low Low None Un-

changed
High High High 16.0.1
CVE-2016-9878 Oracle Retail Assortment Planning Operations & Maintenance (Spring Framework) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.1.3, 15.0.3, 16.0.1
CVE-2017-12617 MICROS Retail XBRi Loss Prevention Retail (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1
CVE-2017-5664 MICROS Relate CRM Software Web Services (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 10.8.x, 11.4.x
CVE-2018-2730 Oracle Retail Merchandising System Cross Pillar HTTP No 6.4 Network Low Low None Changed Low Low None 16.0

Additional CVEs addressed are below:

  • The fix for CVE-2017-5664 also addresses CVE-2016-8735.

Oracle Siebel CRM Risk Matrix

This Critical Patch Update contains 2 new security fixes for Oracle Siebel CRM. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2574 Siebel CRM Desktop Outlook Client HTTP No 8.1 Network Low Low None Un-

changed
High High None 16.0, 17.0
CVE-2018-2632 Siebel Engineering – Installer & Deployment Siebel Approval Manager HTTP No 4.3 Network Low Low None Un-

changed
Low None None 16.0, 17.0

Oracle Sun Systems Products Suite Risk Matrix

This Critical Patch Update contains 13 new security fixes for the Oracle Sun Systems Products Suite. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2611 Sun ZFS Storage Appliance Kit (AK) Core Services HTTP Yes 10.0 Network Low None None Changed High High High Prior to 8.7.13
CVE-2018-2623 Sun ZFS Storage Appliance Kit (AK) User Interface HTTP Yes 9.3 Network Low None None Changed High Low None Prior to 8.7.13
CVE-2018-2664 Sun ZFS Storage Appliance Kit (AK) User Interface HTTP Yes 9.0 Network High None None Changed High High High Prior to 8.7.13
CVE-2018-2624 Sun ZFS Storage Appliance Kit (AK) User Interface HTTP Yes 8.6 Network Low None None Changed High None None Prior to 8.7.13
CVE-2016-0704 Integrated Lights Out Manager (ILOM) System Management (Glibc, OpenSSL) HTTP Yes 8.1 Network High None None Un-

changed
High High High 3.x, 4.x
CVE-2018-2566 Integrated Lights Out Manager (ILOM) Remote Console Application TLS No 7.7 Network High Low Required Changed High High None 3.x, 4.x
CVE-2018-2710 Solaris Kernel ICMP Yes 7.5 Network Low None None Un-

changed
None None High 10
CVE-2018-2568 Integrated Lights Out Manager (ILOM) Remote Console Application TLS Yes 7.3 Network Low None None Un-

changed
Low Low Low 3.x, 4.x
CVE-2018-2578 Solaris Kernel None No 7.2 Local High High Required Changed High High High 11.3
CVE-2018-2717 Solaris SPARC Platform None No 6.6 Local Low Low Required Un-

changed
High High None 10, 11.3
CVE-2017-5715 Oracle X86 Servers BIOS None No 5.6 Local High Low None Changed High None None SW 1.x, SW 2.x See Note 1
CVE-2018-2577 Solaris Kernel None No 5.5 Local Low Low None Un-

changed
High None None 11.3
CVE-2018-2560 Solaris Kernel None No 5.0 Local High High Required Changed High None None 11.3

Notes:

  1. This includes Intel microcode that enables OS and VM level mitigations for CVE-2017-5715. Application of firmware patches to pick up the Intel microcode is required only for Oracle x86 servers using non Oracle OS and Virtualization software. Oracle OS and Oracle VM patches for CVE-2017-5715 will include updated Intel microcode.

Additional CVEs addressed are below:

  • The fix for CVE-2016-0704 also addresses CVE-2014-7817, CVE-2014-9402, CVE-2015-0293, CVE-2015-1472, CVE-2015-3195, CVE-2015-7547, CVE-2016-0703 and CVE-2016-0800.

Oracle Supply Chain Products Suite Risk Matrix

This Critical Patch Update contains 14 new security fixes for the Oracle Supply Chain Products Suite. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5645 Agile Material and Equipment Management for Pharmaceuticals Administration (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.3.3, 9.3.4
CVE-2017-5645 Oracle Agile Engineering Data Management Internal Operations (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 6.1.3, 6.2.0, 6.2.1
CVE-2017-5645 Oracle Agile PLM Security (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.3.3, 9.3.4, 9.3.5, 9.3.6
CVE-2017-5645 Oracle Agile PLM MCAD Connector CAX Client (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 3.3, 3.4, 3.5, 3.6
CVE-2017-5645 Oracle Autovue for Agile Product Lifecycle Management Internal Operations (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 21.0.0, 21.0.1
CVE-2017-5645 Oracle Transportation Management Business Process Automation (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 6.2.11, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.1
CVE-2017-5645 Oracle Transportation Management Importing and Exporting Data (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.1, 6.4.2
CVE-2017-12617 Oracle Agile PLM Folders, Files & Attachments (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 9.3.3, 9.3.4, 9.3.5, 9.3.6
CVE-2017-12617 Oracle Transportation Management Install (Apache Tomcat) HTTP Yes 8.1 Network High None None Un-

changed
High High High 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7
CVE-2017-5664 Oracle Agile Engineering Data Management Install (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 6.1.3, 6.2.0, 6.2.1
CVE-2017-5664 Oracle Agile PLM Folders, Files & Attachments (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 9.3.5, 9.3.6
CVE-2018-2609 Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.5, 9.3.6
CVE-2018-2662 Oracle Transportation Management Security HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 6.2.11, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.1
CVE-2018-2631 Oracle Transportation Management Security HTTP No 4.3 Network Low Low None Un-

changed
Low None None 6.2.11, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.1, 6.4.2, 6.4.3

Additional CVEs addressed are below:

  • The fix for CVE-2017-5664 also addresses CVE-2016-8735.

Oracle Support Tools Risk Matrix

This Critical Patch Update contains 3 new security fixes for Oracle Support Tools. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2018-2615 OSS Support Tools Diagnostic Assistant HTTP No 8.8 Network Low Low None Un-

changed
High High High Prior to 2.11.33
CVE-2018-2616 OSS Support Tools Diagnostic Assistant HTTP No 8.8 Network Low Low None Un-

changed
High High High Prior to 2.11.33
CVE-2018-2617 OSS Support Tools Diagnostic Assistant HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 2.11.33

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 14 new security fixes for Oracle Virtualization. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5645 Oracle Secure Global Desktop (SGD) Core (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.3
CVE-2018-2694 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2698 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2685 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2686 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2687 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2688 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2689 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2690 Oracle VM VirtualBox Core None No 8.6 Local Low None Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2676 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2018-2693 Oracle VM VirtualBox Guest Additions None No 8.2 Local Low Low Required Changed High High High Prior to 5.1.32, Prior to 5.2.6
CVE-2017-3736 Oracle Secure Global Desktop (SGD) Core (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 5.3
CVE-2017-3736 Oracle VM VirtualBox Core (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None Prior to 5.1.32, Prior to 5.2.4
CVE-2017-5715 Oracle VM VirtualBox Core None No 5.6 Local High Low None Changed High None None Prior to 5.1.32, Prior to 5.2.6

Additional CVEs addressed are below:

  • The fix for CVE-2017-3736 also addresses CVE-2017-3735.

Related:

  • No Related Posts

Oracle Security Alert for CVE-2017-10269 – 14 November 2017

Oracle Security Alert Advisory – CVE-2017-10269

Description



This Security Alert addresses CVE-2017-10269 and four other vulnerabilities affecting the Jolt server within Oracle Tuxedo. These vulnerabilities have a maximum CVSS score of 10.0 and may be exploited over a network without the need for a valid username and password. The Oracle Jolt client is not impacted.

Since Oracle PeopleSoft products include and use Oracle Tuxedo in their distributions, PeopleSoft customers should apply the Tuxedo patches referenced below.

Due to the severity of these vulnerabilities, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Security Alert program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Security Alert program for products in the Extended Support Phase.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle:

  • Dmitrii Iudin aka @ret5et of ERPScan: CVE-2017-10266, CVE-2017-10267, CVE-2017-10269, CVE-2017-10272, CVE-2017-10278

References

Affected Products and Components

Security vulnerabilities addressed by this Security Alert affect the products listed below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions Patch Availability
Oracle Tuxedo, versions 11.1.1, 12.1.1, 12.1.3, 12.2.2 Fusion Middleware

Modification History

Date Note
2017-November-16 Rev 2. Updated Credit Statement.
2017-November-14 Rev 1. Initial Release.

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Security Alert contains 5 new security fixes for Oracle Fusion Middleware. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10269 Oracle Tuxedo Core Jolt Yes 10.0 Network Low None None Changed High High Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10272 Oracle Tuxedo Core Jolt No 9.9 Network Low Low None Changed High High Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10267 Oracle Tuxedo Core Jolt Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10278 Oracle Tuxedo Security Jolt Yes 7.0 Network High None None Un-

changed
High Low Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10266 Oracle Tuxedo Core Jolt Yes 5.3 Network Low None None Un-

changed
Low None None 11.1.1, 12.1.1, 12.1.3, 12.2.2

Related:

  • No Related Posts

Oracle Security Alert for CVE-2017-10269 – 13 November 2017

Oracle Security Alert Advisory – CVE-2017-10269

Description



This Security Alert addresses CVE-2017-10269 and four other vulnerabilities affecting the Jolt server within Oracle Tuxedo. These vulnerabilities have a maximum CVSS score of 10.0 and may be exploited over a network without the need for a valid username and password. The Oracle Jolt client is not impacted.

Since Oracle PeopleSoft products include and use Oracle Tuxedo in their distributions, PeopleSoft customers should apply the Tuxedo patches referenced below.

Due to the severity of these vulnerabilities, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Security Alert program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Security Alert program for products in the Extended Support Phase.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle:

  • Dmitrii Iudin aka @ret5et of ERPScan: CVE-2017-10266, CVE-2017-10267, CVE-2017-10269, CVE-2017-10272, CVE-2017-10278

References

Affected Products and Components

Security vulnerabilities addressed by this Security Alert affect the products listed below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions Patch Availability
Oracle Tuxedo, versions 11.1.1, 12.1.1, 12.1.3, 12.2.2 Fusion Middleware

Modification History

Date Note
2017-November-16 Rev 2. Updated Credit Statement.
2017-November-14 Rev 1. Initial Release.

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Security Alert contains 5 new security fixes for Oracle Fusion Middleware. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10269 Oracle Tuxedo Core Jolt Yes 10.0 Network Low None None Changed High High Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10272 Oracle Tuxedo Core Jolt No 9.9 Network Low Low None Changed High High Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10267 Oracle Tuxedo Core Jolt Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10278 Oracle Tuxedo Security Jolt Yes 7.0 Network High None None Un-

changed
High Low Low 11.1.1, 12.1.1, 12.1.3, 12.2.2
CVE-2017-10266 Oracle Tuxedo Core Jolt Yes 5.3 Network Low None None Un-

changed
Low None None 11.1.1, 12.1.1, 12.1.3, 12.2.2

Related:

  • No Related Posts

Oracle Security Alert for CVE-2017-11051 – 27 October 2017

Oracle Security Alert Advisory – CVE-2017-10151

Description

This Security Alert addresses CVE-2017-10151, a vulnerability affecting Oracle Identity Manager. This vulnerability has a CVSS v3 base score of 10.0, and can result in complete compromise of Oracle Identity Manager via an unauthenticated network attack. The Patch Availability Document referenced below provides a full workaround for this vulnerability, and will be updated when patches in addition to the workaround are available.

Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert without delay.

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Security Alert program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Security Alert program for products in the Extended Support Phase.

Credit Statement

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Update or Security Alert Advisories.

In this Security Alert Advisory, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program.:

  • Chris Fischetti

References

Affected Products and Components

Security vulnerabilities addressed by this Security Alert affect the products listed below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions Patch Availability
Oracle Identity Manager, versions 11.1.1.7, 11.1.2.3, 12.2.1.3 Fusion Middleware

Modification History

Date Note
2017-November-04 Rev 3. Updated Credit Statement.
2017-November-01 Rev 2. Updated Supported Versions Affected.
2017-October-27 Rev 1. Initial Release.

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Security Alert contains 1 new security fix for Oracle Fusion Middleware. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10151 Oracle Identity Manager Default Account HTTP Yes 10.0 Network Low None None Changed High High High 11.1.1.7, 11.1.2.3, 12.2.1.3

Related:

Oracle Security Alert for CVE-2017-10151 – 27 October 2017

Oracle Security Alert Advisory – CVE-2017-10151

Description

This Security Alert addresses CVE-2017-10151, a vulnerability affecting Oracle Identity Manager. This vulnerability has a CVSS v3 base score of 10.0, and can result in complete compromise of Oracle Identity Manager via an unauthenticated network attack. The Patch Availability Document referenced below provides a full workaround for this vulnerability, and will be updated when patches in addition to the workaround are available.

Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert without delay.

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly “Oracle Enterprise Manager Grid Control”) and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Security Alert program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Security Alert program for products in the Extended Support Phase.

Credit Statement

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Update or Security Alert Advisories.

In this Security Alert Advisory, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program.:

  • Chris Fischetti

References

Affected Products and Components

Security vulnerabilities addressed by this Security Alert affect the products listed below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions Patch Availability
Oracle Identity Manager, versions 11.1.1.7, 11.1.2.3, 12.2.1.3 Fusion Middleware

Modification History

Date Note
2017-November-04 Rev 3. Updated Credit Statement.
2017-November-01 Rev 2. Updated Supported Versions Affected.
2017-October-27 Rev 1. Initial Release.

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Security Alert contains 1 new security fix for Oracle Fusion Middleware. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10151 Oracle Identity Manager Default Account HTTP Yes 10.0 Network Low None None Changed High High High 11.1.1.7, 11.1.2.3, 12.2.1.3

Related:

  • No Related Posts

Oracle Critical Patch Update Advisory – October 2017

Appendix – Oracle Database Server

Oracle Database Server Executive Summary

This Critical Patch Update contains 6 new security fixes for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

Oracle Database Server Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10321 Core RDBMS Create session Oracle Net No 8.8 Local Low Low None Changed High High High 11.2.0.4, 12.1.0.2, 12.2.0.1 See Note 1
CVE-2016-6814 Spatial (Apache Groovy) None Multiple Yes 8.3 Network High None Required Changed High High High 12.2.0.1 See Note 2
CVE-2017-10190 Java VM Create Session, Create Procedure Multiple No 8.2 Local Low High None Changed High High High 11.2.0.4, 12.1.0.2, 12.2.0.1
CVE-2016-8735 WLM (Apache Tomcat) None Multiple Yes 8.1 Network High None None Un-

changed
High High High 12.2.0.1
CVE-2017-10261 XML Database Create Session Oracle Net No 6.5 Local Low Low None Changed High None None 11.2.0.4, 12.1.0.2 See Note 3
CVE-2017-10292 RDBMS Security Create User Oracle Net No 2.3 Local Low High None Un-

changed
None Low None 11.2.0.4, 12.1.0.2, 12.2.0.1

Notes:

  1. This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 7.8 with scope Unchanged.
  2. Component installed optionally. Not in the default installation.
  3. This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 5.5 with scope Unchanged.

Additional CVEs addressed are below:

  • The fix for CVE-2016-8735 also addresses CVE-2016-6816 and CVE-2016-8745

Appendix – Oracle Communications Applications

Oracle Communications Applications Executive Summary

This Critical Patch Update contains 23 new security fixes for Oracle Communications Applications. 18 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Communications Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5461 Oracle Communications Messaging Server Security (NSS) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 8.x
CVE-2016-5019 Oracle Communications Services Gatekeeper Security (Apache Trinidad) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.1, 6.0
CVE-2015-0235 Oracle Communications User Data Repository Security (glibc) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 10.x
CVE-2015-3253 Oracle Communications WebRTC Session Controller Security (Apache Groovy) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.0, 7.1, 7.2
CVE-2015-0235 Oracle Communications WebRTC Session Controller Media (glibc) TLS Yes 9.8 Network Low None None Un-

changed
High High High 7.0, 7.1, 7.2
CVE-2015-7501 Oracle Communications WebRTC Session Controller Security (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.0, 7.1, 7.2
CVE-2016-0635 Oracle Communications WebRTC Session Controller Security (Spring) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.0, 7.1, 7.2
CVE-2016-2107 Oracle Communications WebRTC Session Controller Security (OpenSSL) TLS Yes 8.2 Network Low None None Un-

changed
Low None High 7.0, 7.1, 7.2
CVE-2014-0224 Tekelec HLR Router Security (OpenSSL) TLS Yes 8.1 Network High None None Un-

changed
High High High 4.x
CVE-2016-7052 Oracle Communications Diameter Signaling Router (DSR) OAM and Signaling (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 7.x
CVE-2016-6304 Oracle Communications Unified Session Manager Routing (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High SCz 7.x
CVE-2014-0114 Oracle Communications WebRTC Session Controller Media (BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.0, 7.1, 7.2
CVE-2014-0107 Oracle Communications WebRTC Session Controller Security (Xalan) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.0, 7.1, 7.2
CVE-2014-4345 Oracle Communications WebRTC Session Controller Security (Kerberos) Multiple Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.0, 7.1, 7.2
CVE-2015-7501 Oracle Communications Order and Service Management Security (Apache Commons Collections) Multiple Yes 7.1 Network Low None Required Changed Low Low Low 7.2.4.x.x, 7.3.0.x.x, 7.3.1.x.x, 7.3.5.x.x
CVE-2016-2381 Oracle Communications Billing and Revenue Management Security (Perl) Multiple No 6.5 Network Low Low None Un-

changed
None High None 7.5
CVE-2017-10153 Oracle Communications WebRTC Session Controller Security (Gson) Multiple No 6.3 Network High Low None Changed None None High 7.0, 7.1, 7.2
CVE-2017-10159 Oracle Communications Policy Management Portal, CMP HTTP Yes 6.1 Network Low None Required Changed Low Low None 11.5, 12.x
CVE-2017-3732 Oracle Communications EAGLE LNP Application Processor Patches (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 10.x
CVE-2014-3538 Oracle Communications WebRTC Session Controller Security (file) HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 7.0, 7.1, 7.2
CVE-2014-8714 Oracle Communications WebRTC Session Controller Security (Wireshark) Multiple Yes 5.3 Network Low None None Un-

changed
None None Low 7.0, 7.1, 7.2
CVE-2014-0062 Oracle Communications WebRTC Session Controller Security (Postgresql) Multiple No 4.2 Network High Low None Un-

changed
Low Low None 7.0, 7.1, 7.2
CVE-2014-3707 Oracle Communications WebRTC Session Controller Security (libcurl) HTTP Yes 3.7 Network High None None Un-

changed
Low None None 7.0, 7.1, 7.2

Additional CVEs addressed are below:

  • The fix for CVE-2014-0062 also addresses CVE-2014-0060
  • The fix for CVE-2014-0224 also addresses CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-3470 and CVE-2014-3571
  • The fix for CVE-2014-3538 also addresses CVE-2014-3587
  • The fix for CVE-2014-3707 also addresses CVE-2014-3613
  • The fix for CVE-2014-4345 also addresses CVE-2014-4342
  • The fix for CVE-2014-8714 also addresses CVE-2014-8713
  • The fix for CVE-2015-7501 also addresses CVE-2015-4852
  • The fix for CVE-2016-2107 also addresses CVE-2015-0207, CVE-2015-0208, CVE-2015-0209, CVE-2015-0285, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0290, CVE-2015-0291, CVE-2015-0292, CVE-2015-0293, CVE-2015-1787, CVE-2015-1793 and CVE-2015-3195
  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303 and CVE-2016-6306
  • The fix for CVE-2016-7052 also addresses CVE-2014-0224, CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, CVE-2015-0207, CVE-2015-0208, CVE-2015-0209, CVE-2015-0285, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0290, CVE-2015-0291, CVE-2015-0292, CVE-2015-0293, CVE-2015-1787, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3197, CVE-2016-0701, CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307 and CVE-2016-6308
  • The fix for CVE-2017-5461 also addresses CVE-2015-7181, CVE-2015-7182, CVE-2015-7183, CVE-2015-7575, CVE-2016-1950, CVE-2016-1979, CVE-2016-2834, CVE-2016-5285, CVE-2017-5462 and CVE-2017-7502

Appendix – Oracle Construction and Engineering Suite

Oracle Construction and Engineering Suite Executive Summary

This Critical Patch Update contains 1 new security fix for the Oracle Construction and Engineering Suite. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Construction and Engineering Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6814 Primavera Unifier Platform (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 9.13, 9.14, 10.x, 15.x, 16.x,

Appendix – Oracle E-Business Suite

Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 26 new security fixes for the Oracle E-Business Suite. 25 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2017), My Oracle Support Note 2304968.1.

Oracle E-Business Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10330 Oracle Common Applications Gantt Server HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10329 Oracle Global Order Promising Reschedule Sales Orders HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10416 Oracle Advanced Outbound Telephony Setup and Configuration HTTP Yes 8.2 Network Low None Required Changed High Low None 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10417 Oracle Advanced Outbound Telephony Setup and Configuration HTTP Yes 8.2 Network Low None Required Changed High Low None 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10325 Oracle Common Applications Calendar Applications Calendar HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10326 Oracle Common Applications Calendar Applications Calendar HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10303 Oracle Interaction Center Intelligence Setup HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3
CVE-2017-10414 Oracle iStore Checkout and Order Placement HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10409 Oracle iStore Merchant UI HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10415 Oracle iSupport Others HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10410 Oracle Knowledge Management Search HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10411 Oracle Knowledge Management User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10412 Oracle Knowledge Management User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10413 Oracle Mobile Field Service Multiplatform Based on HTML5 HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-3444 Oracle Trade Management User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3445 Oracle Trade Management User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3446 Oracle Trade Management User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10323 Oracle Web Applications Desktop Integrator Application Service HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10328 Oracle Application Object Library Diagnostics HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10332 Oracle Universal Work Queue Administration HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10077 Oracle Applications DBA AD Utilities HTTP No 6.5 Network Low High None Un-

changed
High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10331 Oracle Application Object Library Diagnostics HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10324 Oracle Applications Technology Stack Oracle Forms HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10066 Oracle Applications Technology Stack Oracle Forms HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10322 Oracle Common Applications Calendar Applications Calendar HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7
CVE-2017-10387 Oracle CRM Technical Foundation Preferences HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7

Appendix – Oracle Enterprise Manager Grid Control

Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Enterprise Manager Grid Control. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. This fix is not applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2296870.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6814 Oracle Enterprise Manager Ops Center Networking (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 12.2.2, 12.3.2

Appendix – Oracle Financial Services Applications

Oracle Financial Services Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Financial Services Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Financial Services Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10363 Oracle FLEXCUBE Universal Banking Security HTTP No 7.1 Network Low Low None Un-

changed
High Low None 11.3, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0 See Note 1

Notes:

  1. Contact Support for fixes

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 40 new security fixes for Oracle Fusion Middleware. 26 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the October 2017 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2296870.1.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10352 Oracle WebLogic Server WLS-WebServices HTTP Yes 9.9 Network Low None None Changed Low Low High 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0, 12.2.1.3.0
CVE-2015-5254 Oracle BI Publisher BI Publisher Security (Apache ActiveMQ) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.1.1.7.0, 12.2.1.1.0, 12.2.1.2.0 See Note 1
CVE-2016-6814 Oracle JDeveloper Java Business Objects (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 12.2.1.2.0, 12.1.3.0.0
CVE-2015-7501 Management Pack for Oracle GoldenGate Monitor (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.2.1.0.12
CVE-2016-0714 Management Pack for Oracle GoldenGate Monitor (Apache Tomcat) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.2.1.0.12
CVE-2015-7501 Oracle Business Process Management Suite Security (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.9.0, 12.2.1.1.0
CVE-2016-2834 Oracle Directory Server Enterprise Edition Admin Server (NSS) HTTPS Yes 8.8 Network Low None Required Un-

changed
High High High 11.1.1.7.0
CVE-2015-7501 Oracle Endeca Information Discovery Integrator Security (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.4, 3.0, 3.1, 3.2
CVE-2016-0635 Oracle Endeca Information Discovery Integrator Security (Spring Framework) HTTP No 8.8 Network Low Low None Un-

changed
High High High 3.2
CVE-2017-10034 Oracle BI Publisher Core Formatting API HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 11.1.1.9.0
CVE-2017-10060 Oracle Business Intelligence Enterprise Edition Analytics Web General HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10270 Oracle Identity Manager Connector Microsoft Active Directory None No 8.2 Local Low None Required Changed None High High 9.1.1.5.0
CVE-2017-10026 Oracle SOA Suite Fabric Layer HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0
CVE-2017-10360 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed Low High None 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10259 Oracle Access Manager Web Server Plugin HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.2.3.0
CVE-2017-10037 Oracle BI Publisher Web Service API HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1.7.0, 11.1.1.9.0
CVE-2015-7940 Oracle Business Process Management Suite Workspace and Process portal (Bouncy Castle Java package) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2015-7940 Oracle Business Process Management Suite Runtime Engine (Bouncy Castle Java package) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2016-3092 Oracle GlassFish Server Web Container (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 3.1.2
CVE-2015-7940 Oracle Managed File Transfer MFT Runtime Server (Bouncy Castle Java package) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10369 Oracle Virtual Directory Virtual Directory Server HTTP No 7.5 Network High Low None Un-

changed
High High High 11.1.1.7.0, 11.1.1.9.0
CVE-2017-10271 Oracle WebLogic Server WLS Security T3 Yes 7.5 Network Low None None Un-

changed
None None High 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-5662 Oracle API Gateway Oracle API Gateway (Apache Batik) HTTP No 7.3 Network Low Low Required Un-

changed
High None High 11.1.2.4.0 See Note 2
CVE-2017-10391 Oracle GlassFish Server Administration HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 3.0.1, 3.1.2
CVE-2016-1181 Oracle Identity Manager OIM Legacy UI (Apache Struts 1) HTTP No 6.6 Network High High None Un-

changed
High High High 11.1.2.3.0
CVE-2017-10152 Oracle WebLogic Server Web Container HTTP No 6.5 Network Low Low None Un-

changed
High None None 10.3.6.0.0, 12.1.3.0.0
CVE-2017-10163 Oracle Business Intelligence Enterprise Edition Analytics Web General HTTP No 6.3 Network Low Low Required Un-

changed
Low High None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0 See Note 3
CVE-2017-10385 Oracle GlassFish Server Web Container HTTP Yes 6.3 Network Low None Required Un-

changed
Low Low Low 3.0.1, 3.1.2
CVE-2017-10393 Oracle GlassFish Server Web Container HTTP Yes 6.3 Network Low None Required Un-

changed
Low Low Low 3.0.1, 3.1.2
CVE-2017-10055 Oracle iPlanet Web Server Admin Graphical User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.0
CVE-2015-2808 Oracle HTTP Server Web Listener HTTP Yes 5.9 Network High None None Un-

changed
High None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10051 Oracle Outside In Technology Outside In Filters HTTP No 5.7 Adjacent

Network
Low Low None Un-

changed
None None High 8.5.3.0 See Note 4
CVE-2017-10400 Oracle GlassFish Server Administration Graphical User Interface HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 3.1.2
CVE-2017-10154 Oracle Access Manager Web Server Plugin HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 11.1.2.3.0
CVE-2003-1418 Oracle HTTP Server Web Listener HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 11.1.1.9.0, 12.1.3.0.0
CVE-2017-10336 Oracle WebLogic Server Web Container HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10334 Oracle WebLogic Server Web Container HTTP No 4.3 Network Low Low None Un-

changed
Low None None 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10033 Oracle WebCenter Sites Support Tools None No 4.0 Local High None None Un-

changed
Low Low None 11.1.1.8.0, 12.2.1.2.0 See Note 5
CVE-2016-2183 Oracle HTTP Server OSSL Module HTTPS Yes 3.7 Network High None None Un-

changed
Low None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10166 Oracle Security Service C Oracle SSL API HTTPS Yes 3.7 Network High None None Un-

changed
None Low None FMW: 11.1.1.9.0, 12.1.3.0.0

Notes:

  1. Please refer to Doc ID My Oracle Support Note 2310008.1 for instructions on how to address this issue.
  2. Please refer to Doc ID My Oracle Support Note 2313917.1 for instructions on how to address this issue.
  3. Please refer to Doc ID My Oracle Support Note 2310021.1 for instructions on how to address this issue.
  4. Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower.
  5. Please refer to Doc ID My Oracle Support Note 2318213.1 for instructions on how to address this issue.

Additional CVEs addressed are below:

  • The fix for CVE-2015-2808 also addresses CVE-2013-2566
  • The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706 and CVE-2016-0763
  • The fix for CVE-2016-1181 also addresses CVE-2014-0114, CVE-2015-0899 and CVE-2016-1182
  • The fix for CVE-2016-2834 also addresses CVE-2016-1950 and CVE-2016-1979

Appendix – Oracle Health Sciences Applications

Oracle Health Sciences Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Health Sciences Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Health Sciences Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6814 Oracle Healthcare Master Person Index Relationship Management (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 4.x

Appendix – Oracle Hospitality Applications

Oracle Hospitality Applications Executive Summary

This Critical Patch Update contains 37 new security fixes for Oracle Hospitality Applications. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hospitality Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10402 Oracle Hospitality Reporting and Analytics Report HTTP Yes 10.0 Network Low None None Changed High High High 8.5.1, 9.0.0
CVE-2017-5664 Oracle Hospitality Guest Access Base (Apache Tomcat) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 4.2.0, 4.2.1
CVE-2017-10401 Oracle Hospitality Cruise Materials Management MMSUpdater None No 8.7 Local Low Low None Changed Low High High 7.30.564.0
CVE-2017-10372 Oracle Hospitality Guest Access Base HTTP No 8.7 Network Low High None Changed None High High 4.2.0, 4.2.1
CVE-2017-10398 Oracle Hospitality Cruise Fleet Management BaseMasterPage None No 8.4 Local Low Low None Changed High High None 9.0.2.0
CVE-2017-10404 Oracle Hospitality Reporting and Analytics iQuery HTTP No 8.3 Network Low Low None Un-

changed
High High High 8.5.1, 9.0.0
CVE-2017-10396 Oracle Hospitality Cruise AffairWhere AffairWhere None No 8.2 Local Low Low Required Changed High High High 2.2.5.0, 2.2.6.0, 2.2.7.0
CVE-2017-10405 Oracle Hospitality Reporting and Analytics Report HTTP Yes 8.2 Network Low None None Un-

changed
High None Low 8.5.1, 9.0.0
CVE-2017-10050 Oracle Hospitality Suite8 WebConnect HTTP Yes 8.2 Network Low None Required Changed High Low None 8.10.1, 8.10.2
CVE-2017-10403 Oracle Hospitality Reporting and Analytics iQuery HTTP No 8.0 Network High Low Required Changed High High High 8.5.1, 9.0.0
CVE-2017-5662 Oracle Hospitality Guest Access Base (Apache Batik) HTTP No 7.3 Network Low Low Required Un-

changed
High None High 4.2.0, 4.2.1
CVE-2017-10353 Oracle Hospitality Hotel Mobile Suite8/RESTAPI HTTP No 7.1 Network Low Low None Un-

changed
High None Low 1.1
CVE-2017-10370 Oracle Hospitality Guest Access Base HTTP No 6.9 Network Low High Required Changed High Low None 4.2.0, 4.2.1
CVE-2017-10343 Oracle Hospitality Simphony Import/Export HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 2.8, 2.9
CVE-2017-10344 Oracle Hospitality Simphony Import/Export HTTP Yes 6.5 Network High None None Un-

changed
High Low None 2.8, 2.9
CVE-2017-10421 Oracle Hospitality Suite8 Leisure HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.10.1, 8.10.2
CVE-2017-10316 Oracle Hospitality Suite8 WebConnect HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.10.1, 8.10.2
CVE-2017-10361 Oracle Hospitality Cruise Shipboard Property Management System OHC DRS HTTP No 6.4 Network Low Low None Changed Low None Low 8.0.2.0
CVE-2017-10420 Oracle Hospitality Suite8 Leisure HTTP No 6.4 Network Low Low None Changed None Low Low 8.10.1, 8.10.2
CVE-2017-10397 Oracle Hospitality Cruise Fleet Management BaseMasterPage HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.0.2.0
CVE-2017-10339 Oracle Hospitality Suite8 WebConnect HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.10.1, 8.10.2
CVE-2017-10389 Oracle Hospitality Suite8 PMS None No 5.7 Local Low Low Required Changed Low Low Low 8.10.1, 8.10.2
CVE-2017-10395 Oracle Hospitality Cruise Fleet Management GangwayActivityWebApp HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 9.0.2.0
CVE-2017-10367 Oracle Hospitality Simphony Engagement HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 2.8, 2.9
CVE-2017-10340 Oracle Hospitality Simphony Import/Export HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 2.8, 2.9
CVE-2017-10425 Oracle Hospitality Simphony Service Host HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 2.6, 2.7, 2.8, 2.9
CVE-2017-10337 Oracle Hospitality Suite8 Leisure HTTP No 5.4 Network Low Low None Un-

changed
Low None Low 8.10.1, 8.10.2
CVE-2017-10383 Oracle Hospitality Guest Access Interface HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 4.2.0, 4.2.1
CVE-2017-10319 Oracle Hospitality Suite8 Leisure HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.10.1, 8.10.2
CVE-2017-10054 Oracle Hospitality Cruise Materials Management MMS None No 5.1 Local Low None None Un-

changed
Low Low None 7.30.564.0
CVE-2017-10419 Oracle Hospitality Suite8 PMS None No 5.1 Local Low None None Un-

changed
Low Low None 8.10.1, 8.10.2
CVE-2017-10318 Oracle Hospitality Suite8 WebConnect HTTP Yes 4.7 Network Low None Required Changed Low None None 8.10.1, 8.10.2
CVE-2017-10375 Oracle Hospitality Guest Access Base HTTP No 4.6 Network Low Low Required Un-

changed
Low Low None 4.2.0, 4.2.1
CVE-2017-10197 Oracle Hospitality OPERA 5 Property Services Folios None No 4.6 Physical Low None None Un-

changed
High None None 5.4.2.x through 5.5.1.x
CVE-2017-10317 Oracle Hospitality Suite8 WebConnect None No 4.0 Local Low None None Un-

changed
Low None None 8.10.1, 8.10.2
CVE-2017-10014 Oracle Hospitality Hotel Mobile Suite8/RESTAPI HTTP No 3.5 Network Low Low Required Un-

changed
None Low None 1.1
CVE-2017-10399 Oracle Hospitality Cruise Fleet Management GangwayActivityWebApp HTTP No 3.1 Network High Low None Un-

changed
None None Low 9.0.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2017-5664 also addresses CVE-2016-8735

Appendix – Oracle Hyperion

Oracle Hyperion Executive Summary

This Critical Patch Update contains 4 new security fixes for Oracle Hyperion. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hyperion Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10310 Oracle Hyperion Financial Reporting Security Models HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.2
CVE-2017-10312 Oracle Hyperion BI+ UI and Visualization HTTP Yes 7.1 Network Low None Required Un-

changed
High Low None 11.1.2.4
CVE-2017-10358 Oracle Hyperion Financial Reporting Workspace HTTP No 6.4 Network Low Low None Changed Low Low None 11.1.2
CVE-2017-10359 Oracle Hyperion BI+ UI and Visualization HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 11.1.2.4

Appendix – Oracle Java SE

Oracle Java SE Executive Summary

This Critical Patch Update contains 22 new security fixes for Oracle Java SE. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.


The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of “High”, lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.


Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

Oracle Java SE Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10346 Java SE, Java SE Embedded Hotspot Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10285 Java SE, Java SE Embedded RMI Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10388 Java SE, Java SE Embedded Libraries Kerberos Yes 7.5 Network High None Required Un-

changed
High High High Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 2
CVE-2017-10309 Java SE Deployment Multiple Yes 7.1 Network Low None Required Changed Low Low Low Java SE: 8u144, 9 See Note 1
CVE-2017-10274 Java SE Smart Card IO Multiple Yes 6.8 Network High None Required Un-

changed
High High None Java SE: 6u161, 7u151, 8u144, 9 See Note 1
CVE-2017-10356 Java SE, Java SE Embedded, JRockit Security None No 6.2 Local Low None None Un-

changed
High None None Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3
CVE-2017-10293 Java SE Javadoc HTTP Yes 6.1 Network Low None Required Changed Low Low None Java SE: 6u161, 7u151, 8u144, 9 See Note 1
CVE-2017-10342 Java Advanced Management Console Server Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java Advanced Management Console: 2.7
CVE-2017-10350 Java SE, Java SE Embedded JAX-WS Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10349 Java SE, Java SE Embedded JAXP Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10348 Java SE, Java SE Embedded Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10357 Java SE, Java SE Embedded Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2016-9841 Java SE, Java SE Embedded Util (zlib) Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Java SE: 6u161, 7u151, 8u144; Java SE Embedded: 8u144 See Note 1
CVE-2016-10165 Java SE, Java SE Embedded, JRockit 2D (Little CMS 2) Multiple Yes 5.3 Network Low None None Un-

changed
Low None None Java SE: 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3
CVE-2017-10355 Java SE, Java SE Embedded, JRockit Networking Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3
CVE-2017-10281 Java SE, Java SE Embedded, JRockit Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3
CVE-2017-10347 Java SE, JRockit Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144 See Note 1
CVE-2017-10386 Java Advanced Management Console Server HTTP No 4.8 Network Low High Required Changed Low Low None Java Advanced Management Console: 2.7
CVE-2017-10380 Java Advanced Management Console Server HTTP Yes 4.7 Network High None Required Changed Low Low None Java Advanced Management Console: 2.7
CVE-2017-10295 Java SE, Java SE Embedded, JRockit Networking HTTP Yes 4.0 Network High None None Changed None Low None Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3
CVE-2017-10341 Java Advanced Management Console Server Multiple Yes 3.7 Network High None None Un-

changed
None Low None Java Advanced Management Console: 2.7 See Note 1
CVE-2017-10345 Java SE, Java SE Embedded, JRockit Serialization Multiple Yes 3.1 Network High None Required Un-

changed
None None Low Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 See Note 3

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. Applies to the Java SE Kerberos client.
  3. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Additional CVEs addressed are below:

  • The fix for CVE-2016-9841 also addresses CVE-2016-9840, CVE-2016-9842 and CVE-2016-9843

Appendix – Oracle JD Edwards Products

Oracle JD Edwards Products Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle JD Edwards Products. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle JD Edwards Products Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3732 JD Edwards EnterpriseOne Tools Enterprise Infrastructure SEC (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 9.2
CVE-2017-3732 JD Edwards World Security GUI / World Vision (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None A9.1, A9.2, A9.3, A9.4

Additional CVEs addressed are below:

  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, CVE-2017-3730, CVE-2017-3731 and CVE-2017-3733

Appendix – Oracle MySQL

Oracle MySQL Executive Summary

This Critical Patch Update contains 25 new security fixes for Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle MySQL Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10424 MySQL Enterprise Monitor Monitoring: Web MySQL Protocol Yes 8.8 Network Low None Required Un-

changed
High High High 3.2.8.2223 and earlier, 3.3.4.3247 and earlier, 3.4.2.4181 and earlier
CVE-2017-5664 MySQL Enterprise Monitor Monitoring: General (Apache Tomcat) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None High None 3.2.8.2223 and earlier, 3.3.4.3247 and earlier, 3.4.2.4181 and earlier
CVE-2017-10155 MySQL Server Server: Pluggable Auth MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-3731 MySQL Server Server: Security: Encryption (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.6.35 and earlier, 5.7.18 and earlier
CVE-2017-10379 MySQL Server Client programs MySQL Protocol No 6.5 Network Low Low None Un-

changed
High None None 5.5.57 and earlier, 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10384 MySQL Server Server: DDL MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier
CVE-2017-10276 MySQL Server Server: FTS MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10167 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.7.19 and earlier
CVE-2017-10378 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.57 and earlier, 5.6.37 and earlier, 5.7.11 and earlier
CVE-2017-10277 MySQL Connectors Connector/Net MySQL Protocol Yes 5.4 Network Low None Required Un-

changed
Low Low None 6.9.9 and earlier
CVE-2017-10203 MySQL Connectors Connector/Net MySQL Protocol Yes 5.3 Network Low None None Un-

changed
None None Low 6.9.9 and earlier
CVE-2017-10283 MySQL Server Server: Performance Schema MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10313 MySQL Server Group Replication GCS MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.19 and earlier
CVE-2017-10296 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-10311 MySQL Server Server: FTS MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.19 and earlier
CVE-2017-10320 MySQL Server Server: InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.19 and earlier
CVE-2017-10314 MySQL Server Server: Memcached MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10227 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10279 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-10294 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10165 MySQL Server Server: Replication MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.19 and earlier
CVE-2017-10284 MySQL Server Server: Stored Procedure MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-10286 MySQL Server Server: InnoDB MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10268 MySQL Server Server: Replication MySQL Protocol No 4.1 Local High High None Un-

changed
High None None 5.5.57 and earlier, 5.6.37 and earlier, 5.7.19 and earlier
CVE-2017-10365 MySQL Server Server: InnoDB MySQL Protocol No 3.8 Network Low High None Un-

changed
None Low Low 5.7.18 and earlier

Additional CVEs addressed are below:

  • The fix for CVE-2017-3731 also addresses CVE-2016-7055 and CVE-2017-3732

Appendix – Oracle PeopleSoft Products

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 23 new security fixes for Oracle PeopleSoft Products. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle PeopleSoft Products Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10366 PeopleSoft Enterprise PT PeopleTools Performance Monitor HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.54, 8.55, 8.56
CVE-2017-10338 PeopleSoft Enterprise PRTL Interaction Hub Enterprise Portal HTTP Yes 8.2 Network Low None Required Changed High Low None 9.1.00
CVE-2017-10354 PeopleSoft Enterprise PRTL Interaction Hub Enterprise Portal HTTP Yes 8.2 Network Low None Required Changed High Low None 9.1.00
CVE-2017-10364 PeopleSoft Enterprise PeopleTools Updates Environment Mgmt HTTP No 8.1 Network Low Low None Un-

changed
High High None 8.54, 8.55, 8.56
CVE-2017-10335 PeopleSoft Enterprise PT PeopleTools Elastic Search HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.55, 8.56
CVE-2017-10373 PeopleSoft Enterprise PT PeopleTools Health Center HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.55, 8.56
CVE-2017-10362 PeopleSoft Enterprise PeopleTools Sawbridge HTTP Yes 7.2 Network Low None None Changed Low None Low 8.54, 8.55, 8.56
CVE-2017-10280 PeopleSoft Enterprise PeopleTools Test Framework HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2017-10418 PeopleSoft Enterprise PT PeopleTools PeopleSoft CDA HTTP No 6.4 Network Low Low None Changed Low Low None 8.56
CVE-2017-10351 PeopleSoft Enterprise PT PeopleTools Application Server None No 6.2 Local Low None None Un-

changed
High None None 8.54, 8.55, 8.56
CVE-2017-10158 PeopleSoft Enterprise PeopleTools Core HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55, 8.56
CVE-2017-10381 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55, 8.56
CVE-2017-10406 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55, 8.56
CVE-2017-10327 PeopleSoft Enterprise PeopleTools Query HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55, 8.56
CVE-2017-10368 PeopleSoft Enterprise SCM eProcurement Manage Requisition Status HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.00, 9.2.00
CVE-2017-10422 PeopleSoft Enterprise PeopleTools Updates Change Assistant HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.54
CVE-2017-10304 PeopleSoft Enterprise HCM Security HTTP No 5.4 Network Low Low Required Changed Low Low None 9.2
CVE-2017-10394 PeopleSoft Enterprise PeopleTools Security HTTP No 5.4 Network Low Low None Un-

changed
None Low Low 8.54, 8.55, 8.56
CVE-2017-10382 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 4.7 Network Low None Required Changed None Low None 8.54, 8.55, 8.56
CVE-2017-10306 PeopleSoft Enterprise HCM Security HTTP No 4.6 Network Low Low Required Un-

changed
Low Low None 9.2
CVE-2017-10164 PeopleSoft Enterprise FSCM Staffing Front Office HTTP No 4.3 Network Low Low None Un-

changed
Low None None 9.2
CVE-2017-10287 PeopleSoft Enterprise FSCM Strategic Sourcing HTTP No 4.3 Network Low Low None Un-

changed
Low None None 9.2
CVE-2017-10426 PeopleSoft Enterprise FSCM Staffing Front Office HTTP No 2.7 Network Low High None Un-

changed
Low None None 9.2

Appendix – Oracle Retail Applications

Oracle Retail Applications Executive Summary

This Critical Patch Update contains 9 new security fixes for Oracle Retail Applications. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Retail Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6814 Oracle Retail Convenience and Fuel POS Software OPT Server (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 2.1.132
CVE-2016-6814 Oracle Retail Store Inventory Management SIM Integration (Apache Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 13.2.9, 14.0.4, 14.1.3, 15.0.1, 16.0.1
CVE-2017-10065 Oracle Retail Point-of-Service Security HTTP No 8.5 Network Low Low None Changed Low High None 13.2, 13.3, 13.4, 14.0, 14.1
CVE-2017-5664 MICROS Retail XBRi Loss Prevention Retail (Apache Tomcat) HTTP Yes 7.4 Network High None None Un-

changed
High High None 10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1
CVE-2016-3506 Oracle Retail Clearance Optimization Engine Installation Oracle Net Yes 7.4 Network High None None Un-

changed
High High None 13.4
CVE-2016-3506 Oracle Retail Markdown Optimization Installation Oracle Net Yes 7.4 Network High None None Un-

changed
High High None 13.4, 14.0
CVE-2017-5662 MICROS Retail XBRi Loss Prevention Retail (Apache Batik) HTTP No 7.3 Network Low Low Required Un-

changed
High None High 10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1
CVE-2017-10427 Oracle Retail Xstore Point of Service Point of Sale HTTP Yes 6.5 Network High None None Changed Low Low Low 6.0.11, 6.5.11, 7.0.6, 7.1.6, 15.0.1
CVE-2017-10423 Oracle Retail Back Office Security HTTP No 5.4 Network Low Low Required Changed Low Low None 13.2, 13.3, 13.4, 14.0, 14.1

Additional CVEs addressed are below:

  • The fix for CVE-2017-5664 also addresses CVE-2016-8735

Appendix – Oracle Siebel CRM

Oracle Siebel CRM Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Siebel CRM. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Siebel CRM Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2013-1903 Siebel Apps – Field Service Smart Answer (Python) HTTP Yes 10.0 Network Low None None Changed High High High 16.0, 17.0
CVE-2017-10263 Siebel UI Framework UIF Open UI HTTP Yes 8.2 Network Low None Required Changed High Low None 16.0, 17.0
CVE-2017-10333 Siebel UI Framework EAI HTTP No 7.4 Network Low Low None Changed Low Low Low 16.0, 17.0
CVE-2017-10302 Siebel UI Framework UIF Open UI HTTP Yes 6.1 Network Low None Required Changed Low Low None 16.0, 17.0
CVE-2017-10315 Siebel UI Framework UIF Open UI HTTP Yes 6.1 Network Low None Required Changed Low Low None 16.0, 17.0
CVE-2017-10162 Siebel Core – Server Framework Services HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 16.0, 17.0
CVE-2017-10300 Siebel CRM Desktop Siebel Business Service Issues HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 16.0, 17.0
CVE-2017-10264 Siebel UI Framework UIF Open UI HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 16.0, 17.0

Additional CVEs addressed are below:

  • The fix for CVE-2013-1903 also addresses CVE-2013-0255, CVE-2013-1900, CVE-2013-1902, CVE-2014-0060, CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065 and CVE-2014-0066

Appendix – Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle Sun Systems Products Suite. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5706 Oracle Server X7-2/2L, X7-8 Firmware None No 8.2 Local Low High None Changed High High High 1.0 and 1.0.1, 1.0
CVE-2016-6304 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware TLS Yes 7.5 Network Low None None Un-

changed
None None High Prior to XCP2340 and Prior to XCP3030
CVE-2017-10260 Oracle Integrated Lights Out Manager (ILOM) System Management HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 3.2.6
CVE-2016-6304 SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers XCP Firmware TLS Yes 7.5 Network Low None None Un-

changed
None None High Prior to XCP1123
CVE-2017-10265 Oracle Integrated Lights Out Manager (ILOM) System Management HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low Prior to 3.2.6
CVE-2017-3588 Solaris Cluster HA for MySQL None No 7.3 Local Low None Required Un-

changed
High High Low 3.3, 4.3
CVE-2016-7431 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware NTP Yes 5.3 Network Low None None Un-

changed
None Low None Prior to XCP2340 and Prior to XCP3030
CVE-2016-7431 SPARC Enterprise M3000, M4000, M5000, M8000, M9000 Servers XCP Firmware NTP Yes 5.3 Network Low None None Un-

changed
None Low None Prior to XCP1123
CVE-2017-10275 Sun ZFS Storage Appliance Kit (AK) Filesystem None No 5.0 Local Low Low Required Un-

changed
None None High AK 2013
CVE-2017-10099 SPARC M7, T7, S7 based Servers Firmware None No 4.4 Local Low High None Un-

changed
None None High Prior to 9.7.6.b
CVE-2017-10194 Oracle Integrated Lights Out Manager (ILOM) System Management HTTP No 2.7 Network Low High None Un-

changed
Low None None Prior to 3.2.6

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6306, CVE-2016-6515 and CVE-2017-3731
  • The fix for CVE-2016-7431 also addresses CVE-2016-7429 and CVE-2016-7433
  • The fix for CVE-2017-5706 also addresses CVE-2017-5709

Appendix – Oracle Supply Chain Products Suite

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 7 new security fixes for the Oracle Supply Chain Products Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Supply Chain Products Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2015-7501 Oracle Agile Engineering Data Management Install (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 6.1.3, 6.2.0
CVE-2016-3092 Oracle Transportation Management Install (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 6.4.1, 6.4.2
CVE-2017-5664 Oracle Transportation Management Install (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7
CVE-2017-3732 Oracle Agile Engineering Data Management Install (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 6.1.3, 6.2.0
CVE-2017-10161 Oracle Engineering Data Management Web Services Security HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 6.1.3.0, 6.2.2.0
CVE-2017-10299 Oracle Agile PLM Security HTTP No 4.3 Network Low Low None Un-

changed
Low None None 9.3.5, 9.3.6
CVE-2017-10308 Oracle Agile PLM Performance None No 3.5 Physical Low None None Un-

changed
Low Low None 9.3.5, 9.3.6

Additional CVEs addressed are below:

  • The fix for CVE-2016-3092 also addresses CVE-2013-0248 and CVE-2014-0050
  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, CVE-2017-3730, CVE-2017-3731 and CVE-2017-3733
  • The fix for CVE-2017-5664 also addresses CVE-2016-8735

Appendix – Oracle Virtualization

Oracle Virtualization Executive Summary

This Critical Patch Update contains 6 new security fixes for Oracle Virtualization. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Virtualization Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3167 Oracle Secure Global Desktop (SGD) Web Server (Apache HTTP Server) HTTP Yes 7.4 Network High None None Un-

changed
High None High 5.3
CVE-2017-10392 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.30
CVE-2017-10407 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.30
CVE-2017-10408 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.30
CVE-2017-3733 Oracle VM VirtualBox Core (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None Prior to 5.1.30
CVE-2017-10428 Oracle VM VirtualBox Core None No 5.0 Local High High None Changed Low Low Low Prior to 5.1.30

Additional CVEs addressed are below:

  • The fix for CVE-2017-3167 also addresses CVE-2017-3169, CVE-2017-7668, CVE-2017-7679 and CVE-2017-9788
  • The fix for CVE-2017-3733 also addresses CVE-2017-3730, CVE-2017-3731 and CVE-2017-3732

Related:

Oracle Security Alert for CVE-2017-9805 – 22 September 2017


The Apache Foundation’s fixes for CVE-2017-5638, an Apache Struts 2 vulnerability identified by Equifax in relation to Equifax’s recent security incident, were distributed by Oracle to its customers in the April 2017 Critical Patch Update, and should have already been applied to customer systems.

Subsequent to the Equifax breach, the Apache Foundation released fixes for a number of additional Apache Struts 2 vulnerabilities (CVE-2017-9805, CVE-2017-7672, CVE-2017-9787, CVE-2017-9791, CVE-2017-9793, CVE-2017-9804, and CVE-2017-12611). Oracle is distributing these fixes as part of this Security Alert for the benefit of our customers.

Oracle strongly recommends that the fixes contained in this Security Alert be applied without delay.

Please note that the vulnerabilities in this Security Alert are scored using version 3.0 of Common Vulnerability Scoring Standard (CVSS).

This Security Alert is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle’s use of CVRF is available at: http://www.oracle.com/technetwork/topics/security/cpufaq-098434.html#CVRF.

Related:

Oracle Critical Patch Update Advisory – July 2017

Appendix – Oracle Database Server

Oracle Database Server Executive Summary

This Critical Patch Update contains 5 new security fixes for the Oracle Database Server divided as follows:

  • 4 new security fixes for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
  • 1 new security fix for Oracle REST Data Services. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Database Server Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10202 OJVM Create Session, Create Procedure Multiple No 9.9 Network Low Low None Changed High High High 11.2.0.4, 12.1.0.2, 12.2.0.1 See Note 1
CVE-2014-3566 DBMS_LDAP None LDAP Yes 6.8 Network High None None Changed High None None 11.2.0.4, 12.1.0.2
CVE-2016-2183 Real Application Clusters None SSL/TLS Yes 6.8 Network High None Required Un-

changed
High High None 11.2.0.4, 12.1.0.2
CVE-2017-10120 RDBMS Security Create Session, Select Any Dictionary Oracle Net No 1.9 Local High High None Un-

changed
None Low None 12.1.0.2

Notes:

  1. This score is for Windows platforms. On non-Windows platforms Scope is Unchanged, giving a CVSS Base Score of 8.8.

Oracle REST Data Services Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle REST Data Services. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle REST Data Services Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-3092 Oracle REST Data Services None Multiple Yes 7.5 Network Low None None Un-

changed
None None High Prior to 3.0.10.25.02.36

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 44 new security fixes for Oracle Fusion Middleware. 31 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the July 2017 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2261562.1.

Oracle Fusion Middleware Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10137 Oracle WebLogic Server JNDI HTTP Yes 10.0 Network Low None None Changed High High High 10.3.6.0, 12.1.3.0
CVE-2015-3253 Oracle Enterprise Data Quality General (Apache Groovy) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1.13.0.0
CVE-2015-5254 Oracle Enterprise Repository Security Subsystem (Apache ActiveMQ) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.1.1.7.0, 12.1.3.0.0
CVE-2017-5638 Oracle WebLogic Server Sample apps (Struts 2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2015-7501 Oracle Data Integrator Studio HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0
CVE-2015-7501 Oracle Endeca Server Core (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.6.0.0, 7.6.1.0
CVE-2015-7501 Oracle Enterprise Data Quality General (Apache Commons Fileupload) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.1.13.0.0
CVE-2015-7501 Oracle Enterprise Repository Security HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.1.3.0.0
CVE-2016-0635 Oracle Enterprise Repository Security Subsystem HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.1.3.0.0
CVE-2016-2834 Oracle OpenSSO Web Agents (NSS) HTTPS Yes 8.8 Network Low None Required Un-

changed
High High High 3.0.0.8
CVE-2016-2834 Oracle Traffic Director Security (NSS) HTTPS Yes 8.8 Network Low None Required Un-

changed
High High High 11.1.1.7.0, 11.1.1.9.0
CVE-2015-7501 Oracle Tuxedo System and Applications Monitor General (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.2.0, 11.1.1.2.1, 11.1.1.2.2, 12.1.1.1.0, 12.1.3.0.0
CVE-2016-0635 Oracle Tuxedo System and Applications Monitor General (Spring) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.2.0, 11.1.1.2.1, 11.1.1.2.2, 12.1.1.1.0, 12.1.3.0.0, 12.2.2.0.0
CVE-2017-10147 Oracle WebLogic Server Core Components T3 Yes 8.6 Network Low None None Changed None None High 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2017-10025 BI Publisher BI Publisher Security HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 11.1.1.7.0
CVE-2017-10043 BI Publisher BI Publisher Security HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 11.1.1.9.0
CVE-2017-10156 BI Publisher BI Publisher Security HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10024 BI Publisher Layout Tools HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0
CVE-2017-10028 BI Publisher Web Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0
CVE-2017-10029 BI Publisher Web Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0
CVE-2017-10030 BI Publisher Web Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0
CVE-2017-10035 BI Publisher Web Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 11.1.1.9.0
CVE-2017-10048 Oracle Enterprise Repository Web Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7.0, 12.1.3.0.0
CVE-2017-10141 Oracle Outside In Technology Outside In Filters HTTP Yes 8.2 Network Low None None Un-

changed
None Low High 8.5.3.0
CVE-2017-10196 Oracle Outside In Technology Outside In Filters HTTP Yes 8.2 Network Low None None Un-

changed
None Low High 8.5.3.0
CVE-2017-10040 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed Low High None 11.1.1.9.0, 12.2.1.1.0
CVE-2017-10075 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10059 BI Publisher Mobile Service HTTP No 7.6 Network Low Low Required Changed High Low None 11.1.1.7.0
CVE-2017-10041 BI Publisher Web Server HTTP No 7.6 Network Low Low Required Changed High Low None 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10119 Oracle Service Bus OSB Web Console Design, Admin HTTP No 7.6 Network Low Low Required Changed High Low None 11.1.1.9.0
CVE-2016-3092 BI Publisher Web Server (Apache Commons Fileupload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2015-7940 Oracle Enterprise Repository Security Subsystem (Bouncy Castle) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 12.1.3.0.0
CVE-2015-7940 Oracle Secure Enterprise Search Generic (Bouncy Castle) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 11.2.2.2.0
CVE-2017-10058 Oracle Business Intelligence Enterprise Edition Analytics Web Administration HTTP No 6.9 Network Low High Required Changed Low High None 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10157 BI Publisher BI Publisher Security HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-10178 Oracle WebLogic Server Web Container HTTP Yes 6.1 Network Low None Required Changed Low Low None 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2017-3732 Oracle API Gateway OAG (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 11.1.2.4.0
CVE-2017-3732 Oracle Endeca Server Core (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 7.3.0.0, 7.4.0.0, 7.5.0.0, 7.5.1.0, 7.6.0.0, 7.6.1.0, 7.7.0.0
CVE-2017-3732 Oracle Tuxedo SSL Module (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 12.1.1
CVE-2013-2027 Oracle WebLogic Server WLST None No 5.9 Local Low None None Un-

changed
Low Low Low 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2017-10148 Oracle WebLogic Server Core Components T3 Yes 5.8 Network Low None None Changed None Low None 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2017-10063 Oracle WebLogic Server Web Services HTTP Yes 4.8 Network High None None Un-

changed
None Low Low 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2
CVE-2017-10123 Oracle WebLogic Server Web Container HTTP No 4.3 Network Low Low None Un-

changed
Low None None 12.1.3.0
CVE-2014-3566 Oracle Endeca Server Core (OpenSSL) HTTPS Yes 3.4 Network High None Required Changed Low None None 7.4.0.0, 7.5.0.0, 7.5.1.0, 7.6.0.0, 7.6.1.0

Additional CVEs addressed are below:

  • The fix for CVE-2015-7501 also addresses CVE-2011-2730.
  • The fix for CVE-2015-7940 also addresses CVE-2015-7501, and CVE-2016-5019.
  • The fix for CVE-2016-2834 also addresses CVE-2016-1950, and CVE-2016-1979.
  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, and CVE-2017-3731.

Appendix – Oracle Hyperion

Oracle Hyperion Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Hyperion. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hyperion Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-0635 Hyperion Essbase Java Based Agent (Spring) Multiple No 8.8 Network Low Low None Un-

changed
High High High See Note 1

Notes:

  1. Fixed in all versions from 12.2.1.1 onward.

Appendix – Oracle Enterprise Manager Grid Control

Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Enterprise Manager Grid Control. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the July 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2261562.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-5387 Enterprise Manager Ops Center Satellite Framework HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.2.2, 12.3.2
CVE-2016-1181 Oracle Application Testing Suite Installation HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.5.0.2, 12.5.0.3
CVE-2017-10091 Enterprise Manager Base Platform UI Framework HTTP No 7.7 Network Low Low None Changed None High None 12.1.0, 13.1.0, 13.2.0
CVE-2015-7940 Oracle Business Transaction Management Security HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.1.x, 12.1.x
CVE-2016-2381 Oracle Configuration Manager Installation Multiple No 6.5 Network Low Low None Un-

changed
None High None Prior to 12.1.2.0.4
CVE-2017-3732 Enterprise Manager Base Platform Discovery Framework HTTPS Yes 5.9 Network High None None Un-

changed
High None None 12.1.0, 13.1.0, 13.2.0
CVE-2017-3732 Enterprise Manager Ops Center Networking HTTPS Yes 5.9 Network High None None Un-

changed
High None None 12.2.2, 12.3.2
CVE-2016-3092 Enterprise Manager Ops Center Hosted Framework HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 12.2.2, 12.3.2

Additional CVEs addressed are below:

  • The fix for CVE-2016-2381 also addresses CVE-2015-8607, and CVE-2015-8608.
  • The fix for CVE-2016-5387 also addresses CVE-2016-5385, CVE-2016-5386, and CVE-2016-5388.

Appendix – Oracle Applications

Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 22 new security fixes for the Oracle E-Business Suite. 18 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the July 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (July 2017), My Oracle Support Note 2270270.1.

Some of the risk matrix rows in this section are assigned multiple CVE#s. In these cases, additional CVEs are listed below the risk matrix to improve readability. Each group of CVE identifiers share the same description, vulnerability type, Component, Sub-Component and affected versions listed in the risk matrix entry, but occur in different code sections within a Sub-Component.

Oracle E-Business Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10246 Oracle Application Object Library iHelp HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10180 Oracle CRM Technical Foundation CMRO HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10143 Oracle CRM Technical Foundation Preferences HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10185 Oracle CRM Technical Foundation User Management HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10113 Oracle Common Applications CRM User Management Framework HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10170 Oracle Field Service Wireless/WAP HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3
CVE-2017-10171 Oracle Marketing Home Page HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10191 Oracle Web Analytics Common Libraries HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10112 Oracle iStore User Registration HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10174 Oracle iSupport Service Request HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10177 Oracle Application Object Library Flexfields HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.6
CVE-2017-10130 Oracle iStore User Management HTTP No 7.6 Network Low Low Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2016-6304 Application Server OpenSSL HTTPS Yes 7.5 Network Low None None Un-

changed
None None High 12.1.3
CVE-2017-10144 Oracle Applications Manager Oracle Diagnostics Interfaces HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.1.3
CVE-2017-10245 Oracle General Ledger Account Hierarchy Manager HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10179 Application Management Pack for Oracle E-Business Suite User Monitoring HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None AMP 12.1.0.4.0, AMP 13.1.1.1.0
CVE-2017-3562 Oracle Applications DBA AD Utilities HTTP No 6.5 Network Low High None Un-

changed
High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10244 Oracle Application Object Library Attachments HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10184 Oracle Field Service Wireless/WAP HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10192 Oracle iStore Shopping Cart HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10186 Oracle iStore User and Company Profile HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-10175 Oracle iSupport Profiles HTTP No 4.3 Network Low Low None Un-

changed
Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 10 new security fixes for the Oracle Supply Chain Products Suite. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Supply Chain Products Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10039 Oracle Agile PLM Web Client HTTP No 6.8 Network Low Low Required Changed High None None 9.3.5, 9.3.6
CVE-2017-10052 Oracle Agile PLM PCMServlet HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.5, 9.3.6
CVE-2017-10080 Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.5, 9.3.6
CVE-2017-10082 Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.5, 9.3.6
CVE-2017-10092 Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.5, 9.3.6
CVE-2017-3732 Oracle Transportation Management Apache Webserver HTTP Yes 5.9 Network High None None Un-

changed
High None None 6.1, 6.2
CVE-2017-10094 Oracle Agile PLM Security HTTP No 5.4 Network Low Low Required Changed Low Low None 9.3.5, 9.3.6
CVE-2017-10032 Oracle Transportation Management Access Control List HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 6.3.4.1, 6.3.5.1, 6.3.6.1, 6.3.7.1, 6.4.0, 6.4.1, 6.4.2
CVE-2017-10093 Oracle Agile PLM Security HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 9.3.5, 9.3.6
CVE-2017-10088 Oracle Agile PLM Security None No 3.4 Local Low High None Un-

changed
Low Low None 9.3.5, 9.3.6

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 30 new security fixes for Oracle PeopleSoft Products. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle PeopleSoft Products Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10061 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 8.3 Network Low None None Changed Low Low Low 8.54, 8.55
CVE-2017-10146 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 8.3 Network Low None None Changed Low Low Low 8.54, 8.55
CVE-2017-10019 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 7.4 Network Low None Required Changed High None None 8.54, 8.55
CVE-2017-10258 PeopleSoft Enterprise PRTL Interaction Hub Add New Image HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10257 PeopleSoft Enterprise PRTL Interaction Hub Browse Folder Hierarchy HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10215 PeopleSoft Enterprise PRTL Interaction Hub EPPCM_DEFN_CATG HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10248 PeopleSoft Enterprise PRTL Interaction Hub EPPCM_HIER_TOP HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10255 PeopleSoft Enterprise PRTL Interaction Hub EPPCM_HIER_TOP HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10256 PeopleSoft Enterprise PRTL Interaction Hub EPPCM_HIER_TOP HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10100 PeopleSoft Enterprise PRTL Interaction Hub HTML Area HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10126 PeopleSoft Enterprise PRTL Interaction Hub HTML Area HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10247 PeopleSoft Enterprise PRTL Interaction Hub HTML Area HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10070 PeopleSoft Enterprise PRTL Interaction Hub Maintenance Folders HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1.0
CVE-2017-10249 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55
CVE-2017-10021 PeopleSoft Enterprise PeopleTools PIA Search HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55
CVE-2017-10253 PeopleSoft Enterprise PeopleTools Pivot Grid HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55
CVE-2017-10106 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55
CVE-2017-10017 PeopleSoft Enterprise PeopleTools Workcenter HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.54, 8.55
CVE-2017-3731 PeopleSoft Enterprise PeopleTools Security HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.54, 8.55
CVE-2017-10134 PeopleSoft Enterprise FSCM eProcurement HTTP No 5.4 Network Low Low Required Changed Low Low None 9.2
CVE-2017-10057 PeopleSoft Enterprise PRTL Interaction Hub Discussion Forum HTTP No 5.4 Network Low Low Required Changed Low Low None 9.1.0
CVE-2017-10027 PeopleSoft Enterprise PeopleTools Fluid Homepage & Navigation HTTP No 5.4 Network Low Low Required Changed Low Low None 8.54, 8.55
CVE-2017-10045 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 5.3 Network High None Required Un-

changed
High None None 8.54, 8.55
CVE-2017-10015 PeopleSoft Enterprise PeopleTools Application Designer None No 4.7 Local High Low None Un-

changed
High None None 8.54, 8.55
CVE-2017-10251 PeopleSoft Enterprise PeopleTools Test Framework None No 4.7 Local High Low None Un-

changed
High None None 8.54, 8.55
CVE-2017-10250 PeopleSoft Enterprise PeopleTools Tuxedo None No 4.7 Local High Low None Un-

changed
High None None 8.54, 8.55
CVE-2017-10020 PeopleSoft Enterprise PeopleTools Updates Change Assistant None No 4.7 Local High Low None Un-

changed
High None None 8.54, 8.55
CVE-2017-10252 PeopleSoft Enterprise PeopleTools Updates Change Assistant None No 4.7 Local High Low None Un-

changed
High None None 8.54, 8.55
CVE-2017-10018 PeopleSoft Enterprise FSCM Strategic Sourcing HTTP No 4.3 Network Low Low None Un-

changed
None Low None 9.2
CVE-2017-10254 PeopleSoft Enterprise FSCM Staffing Front Office HTTP No 2.7 Network Low High None Un-

changed
Low None None 9.2

Additional CVEs addressed are below:

  • The fix for CVE-2017-3731 also addresses CVE-2016-7055.

Oracle Siebel CRM Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Siebel CRM. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Siebel CRM Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10049 Siebel Core CRM Search HTTP Yes 6.1 Network Low None Required Changed Low Low None 16.0, 17.0

Oracle Commerce Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Commerce. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Commerce Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3732 Oracle Commerce Guided Search / Oracle Commerce Experience Manager Platform Services HTTPS Yes 5.9 Network High None None Un-

changed
High None None 6.1.4, 11.0, 11.1, 11.2

Oracle iLearning Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle iLearning. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle iLearning Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10199 Oracle iLearning Learner Pages HTTP Yes 8.2 Network Low None Required Changed High Low None 6.2

Appendix – Oracle Communications Applications

Oracle Communications Applications Executive Summary

This Critical Patch Update contains 11 new security fixes for Oracle Communications Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Communications Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2015-3253 Oracle Communications BRM Elastic Charging Engine (Apache Groovy) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.2.0.0.0, 11.3.0.0.0
CVE-2015-0235 Oracle Communications Policy Management Platform (GlibC) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.5
CVE-2015-7501 Oracle Communications BRM Elastic Charging Engine (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.2.0.0.0
CVE-2016-0635 Oracle Communications BRM Elastic Charging Engine (Spring) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.2.0.0.0, 11.3.0.0.0
CVE-2016-2107 Oracle Communications Session Router Routing (OpenSSL) TLS Yes 8.2 Network Low None None Un-

changed
Low None High SCZ730, SCZ740, ECZ730
CVE-2016-2107 Oracle Enterprise Communications Broker Routing (OpenSSL) TLS Yes 8.2 Network Low None None Un-

changed
Low None High PCZ210
CVE-2015-7940 Oracle Communications Convergence Mail Proxy (Bouncy Castle) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 3.0, 3.0.1
CVE-2016-6304 Oracle Enterprise Session Border Controller Routing (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High ECZ7.3.0
CVE-2017-10031 Oracle Communications Convergence Mail Proxy (dojo) HTTP Yes 7.2 Network Low None None Changed Low Low None 3.0, 3.0.1
CVE-2016-2107 Oracle Communications EAGLE LNP Application Processor Platform (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 10.0
CVE-2017-3732 Oracle Communications Network Charging and Control Common fns (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 4.4.1.5, 5.0.0.1, 5.0.0.2, 5.0.1.0, 5.0.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-2107 also addresses CVE-2014-0224, CVE-2014-3571, CVE-2015-0286, CVE-2015-0286, CVE-2015-1788, CVE-2015-1788, CVE-2015-1789, CVE-2015-1789, CVE-2015-1790, CVE-2015-1790, CVE-2015-1791, CVE-2015-1791, CVE-2015-1792, CVE-2015-1792, CVE-2015-3195, CVE-2015-3195, CVE-2015-3197, CVE-2015-3197, CVE-2016-2105, CVE-2016-2105, CVE-2016-2106, CVE-2016-2106, CVE-2016-2108, CVE-2016-2108, CVE-2016-2109, and CVE-2016-2109.
  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix – Oracle Financial Services Applications

Oracle Financial Services Applications Executive Summary

This Critical Patch Update contains 20 new security fixes for Oracle Financial Services Applications. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Financial Services Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-0635 Financial Services Behavior Detection Platform Admin Tool (Spring) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.0.1, 8.0.2
CVE-2016-3092 Oracle Banking Platform Collections (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.3, 2.4, 2.4.1, 2.5
CVE-2017-10085 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 7.1 Network Low Low None Un-

changed
High Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10181 Oracle FLEXCUBE Direct Banking Forgot Password HTTP No 6.8 Network Low Low Required Un-

changed
Low Low High 12.0.2, 12.0.3
CVE-2017-10006 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 6.5 Network Low Low None Un-

changed
None High None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10103 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 6.5 Network Low Low None Un-

changed
High None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10023 Oracle FLEXCUBE Private Banking Operations HTTP No 6.5 Network Low Low None Un-

changed
High None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10084 Oracle FLEXCUBE Universal Banking Report Generator HTTP No 6.5 Network Low Low None Un-

changed
High None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10005 Oracle FLEXCUBE Private Banking Miscellaneous HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10083 Oracle FLEXCUBE Universal Banking Infrastructure HTTP Yes 6.1 Network Low None Required Changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10011 Oracle FLEXCUBE Private Banking Miscellaneous None No 5.5 Local Low Low None Un-

changed
High None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10012 Oracle FLEXCUBE Private Banking Operations HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10072 Oracle FLEXCUBE Universal Banking All Modules HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10073 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.4 Network Low Low Required Changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10098 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-10010 Oracle FLEXCUBE Private Banking FileUploads HTTP No 4.6 Network Low Low Required Un-

changed
Low Low None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10009 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.3 Network Low Low None Un-

changed
None Low None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10007 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.3 Network Low Low None Un-

changed
Low None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10008 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.3 Network Low Low None Un-

changed
Low None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10022 Oracle FLEXCUBE Private Banking Operations HTTP No 4.3 Network Low Low None Un-

changed
Low None None 2.0.0, 2.0.1, 2.2.0, 12.0.1
CVE-2017-10071 Oracle FLEXCUBE Universal Banking All Modules HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0

Appendix – Oracle Hospitality Applications

Oracle Hospitality Applications Executive Summary

This Critical Patch Update contains 48 new security fixes for Oracle Hospitality Applications. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hospitality Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5689 MICROS PC Workstation 2015 BIOS (Intel AMT) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to O1302h See Note 1
CVE-2017-5689 MICROS Workstation 650 BIOS (Intel AMT) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to E1500n See Note 2
CVE-2017-10000 Oracle Hospitality Reporting and Analytics Reporting HTTP No 7.7 Network Low Low None Changed None None High 8.5.1, 9.0.0
CVE-2017-10232 Hospitality WebSuite8 Cloud Service General HTTP No 7.6 Network Low Low None Un-

changed
High Low Low 8.9.6, 8.10.x
CVE-2017-10001 Oracle Hospitality Simphony First Edition Core HTTP No 7.6 Network Low Low Required Un-

changed
High Low High 1.7.1
CVE-2017-10136 Oracle Hospitality Simphony Import/Export HTTP Yes 7.5 Network Low None None Un-

changed
High None None 2.9
CVE-2017-10206 Oracle Hospitality Simphony Engagement HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 2.9
CVE-2017-10226 Oracle Hospitality Cruise Fleet Management Fleet Management System Suite HTTP No 7.1 Network Low Low None Un-

changed
High Low None 9.0
CVE-2017-10225 Oracle Hospitality RES 3700 OPS Operations NA No 7.0 Physical High Low None Changed High High Low 5.5
CVE-2017-10216 Hospitality Property Interfaces Parser HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.10.x
CVE-2017-10212 Hospitality Suite8 WebConnect HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.10.x
CVE-2017-10047 MICROS BellaVita Interface HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None 2.7.x
CVE-2017-10224 Oracle Hospitality Inventory Management Inventory and Count Cycle HTTP No 6.4 Network Low Low None Changed Low Low None 8.5.1, 9.0.0
CVE-2017-10076 Oracle Hospitality Simphony First Edition Venue Management Core HTTP No 6.4 Network Low Low None Changed Low Low None 3.9
CVE-2017-10211 Hospitality Suite8 WebConnect HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.10.x
CVE-2017-10128 Hospitality WebSuite8 Cloud Service General HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.9.6, 8.10.x
CVE-2017-10064 Hospitality WebSuite8 Cloud Service General HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.9.6, 8.10.x
CVE-2017-10097 Oracle Hospitality Reporting and Analytics Reporting HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.5.1, 9.0.0
CVE-2017-10079 Oracle Hospitality Suites Management Core HTTP Yes 6.1 Network Low None Required Changed Low Low None 3.7
CVE-2017-10188 Hospitality Hotel Mobile Suite 8/Android None No 5.5 Local Low Low None Un-

changed
High None None 1.01
CVE-2017-10189 Hospitality Suite8 Leisure None No 5.5 Local Low Low None Un-

changed
High None None 8.10.x
CVE-2017-10169 Oracle Hospitality 9700 Operation Security None No 5.5 Local Low Low None Un-

changed
High None None 4.0
CVE-2017-10056 Oracle Hospitality 9700 Property Management Systems None No 5.5 Local Low Low None Un-

changed
High None None 4.0
CVE-2017-10231 Oracle Hospitality Cruise AffairWhere AWExport None No 5.5 Local Low Low None Un-

changed
High None None 2.2.05.062
CVE-2017-10219 Oracle Hospitality Guest Access Base None No 5.5 Local Low Low None Un-

changed
High None None 4.2.0.0, 4.2.1.0
CVE-2017-10201 Oracle Hospitality e7 Other None No 5.5 Local Low Low None Un-

changed
High None None 4.2.1
CVE-2017-10230 Oracle Hospitality Cruise Dining Room Management SilverWhere HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.0.75
CVE-2017-10229 Oracle Hospitality Cruise Materials Management Event Viewer HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 7.30.562
CVE-2017-10228 Oracle Hospitality Cruise Shipboard Property Management System Module HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.0.0.0
CVE-2017-10002 Oracle Hospitality Inventory Management Settings and Config HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.5.1, 9.0.0
CVE-2017-10222 Oracle Hospitality Materials Control Production Tool HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.31.4, 8.32.0
CVE-2017-10223 Oracle Hospitality Materials Control Purchasing HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.31.4, 8.32.0
CVE-2017-10142 Oracle Hospitality Reporting and Analytics Mobile Apps HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.5.1, 9.0.0
CVE-2017-10044 Oracle Hospitality Reporting and Analytics Reporting HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 8.5.1, 9.0.0
CVE-2017-10207 Oracle Hospitality Simphony Utilities HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 2.9
CVE-2017-10069 Oracle Payment Interface Core HTTP No 5.3 Network High Low None Un-

changed
High None None 6.1.1
CVE-2017-10221 Oracle Hospitality RES 3700 OPS Operations None No 5.0 Local High Low Required Changed Low Low Low 5.5
CVE-2017-10168 Hospitality Hotel Mobile Suite 8/Windows NA No 4.6 Physical High Low None Un-

changed
High None Low 1.1
CVE-2017-10182 Oracle Hospitality OPERA 5 Property Services OPERA Export Functionality HTTP No 4.4 Network High High None Un-

changed
High None None 5.4.0.x, 5.4.1.x, 5.4.3.x
CVE-2017-10200 Oracle Hospitality e7 Other None No 4.4 Local Low Low None Un-

changed
Low Low None 4.2.1
CVE-2017-10133 Hospitality Hotel Mobile Suite8/RestAPI HTTP No 4.3 Network Low Low None Un-

changed
None Low None 1.1
CVE-2017-10132 Hospitality Hotel Mobile Suite8/iOS HTTP No 4.3 Network Low Low None Un-

changed
None Low None 1.05
CVE-2017-10217 Oracle Hospitality Guest Access Base HTTP No 4.3 Network Low Low None Un-

changed
None Low None 4.2.0.0, 4.2.1.0
CVE-2017-10218 Oracle Hospitality Guest Access Base HTTP No 4.3 Network Low Low None Un-

changed
Low None None 4.2.0.0, 4.2.1.0
CVE-2017-10205 Oracle Hospitality Simphony Enterprise Management Console HTTP No 4.3 Network Low Low None Un-

changed
Low None None 2.9
CVE-2017-10195 Oracle Hospitality Simphony Import/Export HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 2.8
CVE-2017-10208 Oracle Hospitality e7 Other SMTP No 4.3 Network Low Low None Un-

changed
Low None None 4.2.1
CVE-2017-10220 Hospitality Property Interfaces Parser None No 4.0 Local Low None None Un-

changed
Low None None 8.10.x
CVE-2017-10213 Hospitality Suite8 WebConnect None No 4.0 Local Low None None Un-

changed
Low None None 8.10.x

Notes:

  1. MICROS PC Workstation 2015 systems with Intel ME firmware 6.2.61.3535 or later are not affected by this issue. See Patch Availability document for MICROS PC Workstation 2015 for identifying the Intel ME firmware version on this device.
  2. MICROS Workstation 650 systems running Intel ME firmware 10.0.55.3000 or later are not affected by this issue. See Patch Availability document for MICROS Workstation 650 for identifying the Intel ME firmware version on this device.

Appendix – Oracle Retail Applications

Oracle Retail Applications Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Retail Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Retail Applications Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5689 MICROS PC Workstation 2015 BIOS (Intel AMT) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to O1302h See Note 1
CVE-2017-5689 MICROS Workstation 650 BIOS (Intel AMT) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to E1500n See Note 2
CVE-2016-6814 Oracle Retail Allocation Manage Allocation HTTP Yes 9.6 Network Low None Required Changed High High High 13.3.1, 14.0.4, 14.1.3, 15.0.1, 16.0.1
CVE-2016-6814 Oracle Retail Customer Insights ODI Configuration HTTP Yes 9.6 Network Low None Required Changed High High High 15.0, 16.0
CVE-2017-10214 Oracle Retail Xstore Point of Service Xstore Office HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 6.0.x, 6.5.x, 7.0.x, 7.1.x, 15.0.x, 16.0.0
CVE-2016-3506 Oracle Retail Warehouse Management System Installers Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.0.4, 14.1.3, 15.0.1
CVE-2016-3506 Oracle Retail Workforce Management Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 1.60.7, 1.64.0
CVE-2017-10183 Oracle Retail Xstore Point of Service Point of Sale HTTP Yes 6.5 Network High None None Changed Low Low Low 6.0.x, 6.5.x, 7.0.x, 7.1.x, 15.0.x, 16.0.0
CVE-2017-10172 Oracle Retail Open Commerce Platform Framework HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.0, 5.1, 5.2, 5.3, 6.0, 6.1, 15.0, 15.1
CVE-2017-10173 Oracle Retail Open Commerce Platform Website HTTP Yes 5.8 Network Low None None Changed None Low None 5.0, 5.1, 5.2, 5.3, 6.0, 6.1, 15.0, 15.1

Notes:

  1. MICROS PC Workstation 2015 systems with Intel ME firmware 6.2.61.3535 or later are not affected by this issue. See Patch Availability document for MICROS PC Workstation 2015 for identifying the Intel ME firmware version on this device.
  2. MICROS Workstation 650 systems running Intel ME firmware 10.0.55.3000 or later are not affected by this issue. See Patch Availability document for MICROS Workstation 650 for identifying the Intel ME firmware version on this device.

Appendix – Oracle Policy Automation

Oracle Policy Automation Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Policy Automation. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Policy Automation Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-3092 Oracle Policy Automation Determinations Engine (Apache Commons FileUplaod) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.1.0, 12.1.1, 12.2.0, 12.2.1, 12.2.2, 12.2.3

Appendix – Oracle Primavera Products Suite

Oracle Primavera Products Suite Executive Summary

This Critical Patch Update contains 9 new security fixes for the Oracle Primavera Products Suite. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Primavera Products Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6814 Primavera Gateway Primavera Integration (Groovy) HTTP Yes 9.6 Network Low None Required Changed High High High 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2
CVE-2016-5019 Primavera P6 Enterprise Project Portfolio Management Web Access (Apache Trinidad) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.3, 8.4, 15.1, 15.2
CVE-2015-0254 Primavera Gateway Primavera Integration (Standard) HTTP No 6.5 Network Low Low Required Changed Low Low Low 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2
CVE-2017-10038 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP No 6.5 Network Low Low None Un-

changed
High None None 15.1, 15.2, 16.1, 16.2
CVE-2017-10131 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP No 6.5 Network Low Low Required Changed Low Low Low 8.3, 8.4, 15.1, 15.2, 16.1, 16.2
CVE-2017-10046 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP No 5.4 Network Low Low Required Changed Low Low None 8.3, 8.4, 15.1, 15.2, 16.1
CVE-2017-10149 Primavera Unifier Platform HTTP No 4.8 Network Low High Required Changed Low Low None 9.13, 9.14, 10.1, 10.2, 15.1, 15.2, 16.1, 16.2
CVE-2017-10160 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP No 4.3 Network Low Low None Un-

changed
Low None None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2
CVE-2017-10150 Primavera Unifier Platform HTTP No 4.3 Network Low Low None Un-

changed
None Low None 9.13, 9.14, 10.1, 10.2, 15.1, 15.2, 16.1, 16.2

Appendix – Oracle Java SE

Oracle Java SE Executive Summary

This Critical Patch Update contains 32 new security fixes for Oracle Java SE. 28 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.


The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of “High”, lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.


Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

Oracle Java SE Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10110 Java SE AWT Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131 See Note 1
CVE-2017-10089 Java SE ImageIO Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131 See Note 1
CVE-2017-10086 Java SE JavaFX Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 7u141, 8u131 See Note 1
CVE-2017-10096 Java SE, Java SE Embedded JAXP Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10101 Java SE, Java SE Embedded JAXP Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10087 Java SE, Java SE Embedded Libraries Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10090 Java SE, Java SE Embedded Libraries Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10111 Java SE, Java SE Embedded Libraries Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10107 Java SE, Java SE Embedded RMI Multiple Yes 9.6 Network Low None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10102 Java SE, Java SE Embedded RMI Multiple Yes 9.0 Network High None None Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 2
CVE-2017-10114 Java SE JavaFX Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 7u141, 8u131 See Note 1
CVE-2017-10074 Java SE, Java SE Embedded Hotspot Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10116 Java SE, Java SE Embedded, JRockit Security Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10078 Java SE Scripting Multiple No 8.1 Network Low Low None Un-

changed
High High None Java SE: 8u131 See Note 3
CVE-2017-10067 Java SE Security Multiple Yes 7.5 Network High None Required Un-

changed
High High High Java SE: 6u151, 7u141, 8u131 See Note 1
CVE-2017-10115 Java SE, Java SE Embedded, JRockit JCE Multiple Yes 7.5 Network Low None None Un-

changed
High None None Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10118 Java SE, Java SE Embedded, JRockit JCE Multiple Yes 7.5 Network Low None None Un-

changed
High None None Java SE: 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10176 Java SE, Java SE Embedded, JRockit Security Multiple Yes 7.5 Network Low None None Un-

changed
High None None Java SE: 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10104 Java Advanced Management Console Server HTTP No 7.4 Network Low Low None Changed Low Low Low Java Advanced Management Console: 2.6
CVE-2017-10145 Java Advanced Management Console Server Multiple No 7.4 Network Low Low None Changed Low Low Low Java Advanced Management Console: 2.6
CVE-2017-10125 Java SE Deployment None No 7.1 Physical High None None Changed High High High Java SE: 7u141, 8u131 See Note 4
CVE-2017-10198 Java SE, Java SE Embedded, JRockit Security Multiple Yes 6.8 Network High None None Changed High None None Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10243 Java SE, Java SE Embedded, JRockit JAX-WS Multiple Yes 6.5 Network Low None None Un-

changed
Low None Low Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10121 Java Advanced Management Console Server HTTP Yes 6.1 Network Low None Required Changed Low Low None Java Advanced Management Console: 2.6
CVE-2017-10135 Java SE, Java SE Embedded, JRockit JCE Multiple Yes 5.9 Network High None None Un-

changed
High None None Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10117 Java Advanced Management Console Server HTTP Yes 5.3 Network Low None None Un-

changed
Low None None Java Advanced Management Console: 2.6
CVE-2017-10053 Java SE, Java SE Embedded, JRockit 2D Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10108 Java SE, Java SE Embedded, JRockit Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 3
CVE-2017-10109 Java SE, Java SE Embedded, JRockit Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 See Note 1
CVE-2017-10105 Java SE Deployment Multiple Yes 4.3 Network Low None Required Un-

changed
None Low None Java SE: 6u151, 7u141, 8u131 See Note 1
CVE-2017-10081 Java SE, Java SE Embedded Hotspot Multiple Yes 4.3 Network Low None Required Un-

changed
None Low None Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1
CVE-2017-10193 Java SE, Java SE Embedded Security Multiple Yes 3.1 Network High None Required Un-

changed
Low None None Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131 See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.
  3. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
  4. Applies to deployment of Java where the Java Auto Update is enabled.

Appendix – Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle Sun Systems Products Suite. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3632 Solaris CDE Calendar TCP Yes 9.8 Network Low None None Un-

changed
High High High 10, 11 See Note 1
CVE-2017-10013 Sun ZFS Storage Appliance Kit (AK) User Interface HTTP Yes 8.3 Network High None Required Changed High High High AK 2013
CVE-2017-10042 Solaris IKE IKE Yes 7.5 Network Low None None Un-

changed
None None High 10, 11
CVE-2017-10036 Solaris NFSv4 NFSv4 Yes 7.5 Network Low None None Un-

changed
None None High 10, 11
CVE-2017-10016 Sun ZFS Storage Appliance Kit (AK) User Interface HTTP Yes 7.5 Network High None Required Un-

changed
High High High AK 2013
CVE-2017-10234 Solaris Cluster NAS device addition None No 7.3 Local Low Low Required Un-

changed
High High High 4
CVE-2017-10004 Solaris Kernel None No 6.7 Local Low High None Un-

changed
High High High 10, 11
CVE-2017-10062 Solaris Oracle Java Web Console None No 5.3 Local Low Low None Un-

changed
Low Low Low 10
CVE-2017-10003 Solaris Network Services Library None No 4.5 Local High Low None Un-

changed
Low Low Low 10
CVE-2017-10095 Solaris Kernel None No 3.3 Local Low None Required Un-

changed
None Low None 11
CVE-2017-10122 Solaris Kernel None No 1.8 Local High High Required Un-

changed
None Low None 10, 11

Notes:

  1. CVE-2017-3632 is assigned to the “EASYSTREET” vulnerability.

Appendix – Oracle Linux and Virtualization

Oracle Virtualization Executive Summary

This Critical Patch Update contains 14 new security fixes for Oracle Virtualization. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Virtualization Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-10204 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.1.24
CVE-2017-10129 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.1.24
CVE-2017-10210 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10233 Oracle VM VirtualBox Core None No 7.3 Local Low Low None Changed None Low High Prior to 5.1.24
CVE-2017-10236 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10237 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10238 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10239 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10240 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10241 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10242 Oracle VM VirtualBox Core None No 7.3 Local Low High None Changed Low Low High Prior to 5.1.24
CVE-2017-10235 Oracle VM VirtualBox Core None No 6.7 Local Low High None Changed None Low High Prior to 5.1.24
CVE-2017-10209 Oracle VM VirtualBox Core None No 5.2 Local Low Low None Changed Low None Low Prior to 5.1.24
CVE-2017-10187 Oracle VM VirtualBox Core None No 4.6 Local Low High None Changed None Low Low Prior to 5.1.24

Appendix – Oracle MySQL

Oracle MySQL Executive Summary

This Critical Patch Update contains 30 new security fixes for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle MySQL Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-4436 MySQL Enterprise Monitor Monitor: General (Apache Struts 2) HTTP over TLS Yes 9.8 Network Low None None Un-

changed
High High High 3.1.5.7958 and earlier, 3.2.5.1141 and earlier, 3.3.2.1162 and earlier,
CVE-2017-5651 MySQL Enterprise Monitor Monitoring: Server (Apache Tomcat) HTTP over TLS Yes 9.8 Network Low None None Un-

changed
High High High 3.2.7.1204 and earlier, 3.3.3.1199 and earlier
CVE-2017-5647 MySQL Enterprise Monitor Monitoring: Server (Apache Tomcat) HTTP over TLS Yes 7.5 Network Low None None Un-

changed
High None None 3.3.3.1199 and earlier
CVE-2017-3633 MySQL Server Server: Memcached Memcached Yes 6.5 Network High None None Un-

changed
None Low High 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3634 MySQL Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3732 MySQL Connectors Connector/C (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 6.1.9 and earlier
CVE-2017-3732 MySQL Connectors Connector/ODBC (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 5.3.7 and earlier
CVE-2017-3732 MySQL Server Server: Security: Encryption (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3635 MySQL Connectors Connector/C MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 6.1.10 and earlier See Note 1
CVE-2017-3635 MySQL Server C API MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier See Note 1
CVE-2017-3636 MySQL Server Client programs MySQL Protocol No 5.3 Local Low Low None Un-

changed
Low Low Low 5.5.56 and earlier, 5.6.36 and earlier
CVE-2017-3529 MySQL Server Server: UDF MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3637 MySQL Server X Plugin X Protocol No 5.3 Network High Low None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3639 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3640 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3641 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3643 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3644 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3638 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3642 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3645 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.18 and earlier
CVE-2017-3646 MySQL Server X Plugin X Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.16 and earlier
CVE-2014-1912 MySQL Cluster CLSTCONF (Python) MySQL Protocol Yes 4.8 Network High None None Un-

changed
None Low Low 7.3.5 and earlier
CVE-2017-3648 MySQL Server Server: Charsets MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3647 MySQL Server Server: Replication MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3649 MySQL Server Server: Replication MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3651 MySQL Server Client mysqldump MySQL Protocol No 4.3 Network Low Low None Un-

changed
None Low None 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3652 MySQL Server Server: DDL MySQL Protocol No 4.2 Network High Low None Un-

changed
Low Low None 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
CVE-2017-3650 MySQL Server C API MySQL Protocol Yes 3.7 Network High None None Un-

changed
Low None None 5.7.18 and earlier
CVE-2017-3653 MySQL Server Server: DDL MySQL Protocol No 3.1 Network High Low None Un-

changed
None Low None 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier

Notes:

  1. The documentation has also been updated for the correct way to use mysql_stmt_close(). Please see:

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-execute.html,

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-fetch.html,

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-close.html,

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-error.html,

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-errno.html, and

    https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-sqlstate.html

Additional CVEs addressed are below:

  • The fix for CVE-2016-4436 also addresses CVE-2016-4430, CVE-2016-4431, CVE-2016-4433, CVE-2016-4438, and CVE-2016-4465.
  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, and CVE-2017-3731.
  • The fix for CVE-2017-5651 also addresses CVE-2017-5650.

Appendix – Oracle Support Tools

Oracle Support Tools Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Support Tools. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Support Tools Risk Matrix

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3732 Oracle Explorer Tools (OpenSSL) HTTP Yes 5.9 Network High None None Un-

changed
High None None Prior to 8.16

Related:

  • No Related Posts

Oracle Security Alert for CVE-2017-3629

Oracle Security Alert for CVE-2017-3629



Description

This Security Alert addresses CVE-2017-3629 and two other vulnerabilities affecting Oracle Solaris. These are local privilege escalation vulnerabilities that may only be exploited over a network with a valid username and password. Together, these vulnerabilities may allow privilege escalation to root.

Due to the severity of these vulnerabilities and the public disclosure of technical details, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Affected Products and Versions

Oracle Solaris, versions 10 and 11 are affected.

Patch Availability Table and Risk Matrix



Patch Availability Table



Product Risk Matrix Patch Availability

Oracle Solaris Oracle Sun Systems Products Suite



Credit Statement

Qualys Research Labs reported the security vulnerabilities that are addressed by this Security Alert to Oracle.

References

Modification History



Date Comments
2017-June-20 Rev 2. Replaced Solaris version 11.3 with 11
2017-June-19 Rev 1. Initial Release



Appendix – Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Security Alert contains 3 new security fixes for the Oracle Sun Systems Products Suite. None of these vulnerabilities are remotely exploitable without authentication, i.e., none may be exploited over a network without valid user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix



CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3629 Solaris Kernel None No 7.8 Local Low Low None Un-

changed
High High High 10, 11
CVE-2017-3630 Solaris Kernel None No 5.3 Local Low Low None Un-

changed
Low Low Low 10, 11
CVE-2017-3631 Solaris Kernel None No 5.3 Local Low Low None Un-

changed
Low Low Low 11

Related:

Oracle Critical Patch Update Advisory – April 2017

Appendix – Oracle Database Server

Oracle Database Server Executive Summary

This Critical Patch Update contains 3 new security fixes for the Oracle Database Server divided as follows:

  • 2 new security fixes for the Oracle Database Server. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. 1 of these fixes is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
  • 1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Database Server Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3486 SQL*Plus Local Logon Oracle Net No 7.2 Local High High Required Changed High High High 11.2.0.4, 12.1.0.2 See Note 1
CVE-2017-3567 OJVM Create Session, Create Procedure Multiple No 5.3 Network High Low None Un-

changed
None None High 11.2.0.4, 12.1.0.2

Notes:

  1. This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 6.3 with scope Unchanged.

Oracle Database Server Client-Only Installations

The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2017-3486.

Oracle Secure Backup Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Secure Backup Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-6290 PHP None Multiple Yes 9.8 Network Low None None Un-

changed
High High High Prior to 12.1.0.3.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-6290 also addresses CVE-2016-6288, CVE-2016-6289, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, and CVE-2016-6297.

Appendix – Oracle Berkeley DB

Oracle Berkeley DB Executive Summary

This Critical Patch Update contains 14 new security fixes for Oracle Berkeley DB. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Berkeley DB Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3604 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3605 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3606 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3607 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3608 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3609 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3610 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3611 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3612 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3613 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3614 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3615 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3616 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32
CVE-2017-3617 Data Store None None No 7.0 Local High None Required Un-

changed
High High High Prior to 6.2.32

Appendix – Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 31 new security fixes for Oracle Fusion Middleware. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Fusion Middleware Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 Oracle WebCenter Sites Third Party Tools (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3553 Oracle Identity Manager Rules Engine HTTP No 9.9 Network Low Low None Changed High High High 11.1.2.3.0
CVE-2016-6303 Oracle API Gateway Oracle API Gateway (OpenSSL) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 11.1.2.4.0
CVE-2015-7501 Oracle Fusion Middleware MapViewer Install (Apache Commons Collections) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.1.1.9, 12.2.1.1, 12.2.1.2
CVE-2017-5638 Oracle WebLogic Server Samples (Struts 2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2
CVE-2016-0714 Oracle WebCenter Sites Apache Tomcat HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.8.0
CVE-2015-7501 Oracle WebCenter Sites Sites (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3230 Oracle Fusion Middleware MapViewer Map Builder HTTP Yes 8.6 Network Low None None Un-

changed
Low High Low 11.1.1.9, 12.2.1.1, 12.2.1.2
CVE-2017-3540 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3542 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un-

changed
High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3543 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un-

changed
High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3625 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7, 11.1.1.9, 12.2.1.0, 12.2.1.1, 12.2.1.2
CVE-2017-3545 Oracle WebCenter Sites Blob Server HTTP Yes 8.2 Network Low None None Un-

changed
Low High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3541 Oracle WebCenter Sites Server HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3601 Oracle API Gateway Oracle API Gateway HTTP Yes 8.1 Network Low None Required Un-

changed
High High None 11.1.2.4.0
CVE-2017-3602 Oracle WebCenter Sites Advanced UI HTTP No 8.1 Network Low Low None Un-

changed
High High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3554 Oracle WebCenter Sites Catalog Mover HTTP No 8.1 Network Low Low None Un-

changed
High High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2016-1181 Oracle WebLogic Server Samples (Struts 1) HTTP Yes 8.1 Network High None None Un-

changed
High High High 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2
CVE-2017-3596 Oracle WebCenter Sites Advanced UI HTTP No 7.6 Network Low Low None Un-

changed
High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3499 Oracle Social Network Android Client HTTPS Yes 7.5 Network Low None None Un-

changed
High None None prior to 11.1.12.0.0 (17019101)
CVE-2017-3506 Oracle WebLogic Server Web Services HTTP Yes 7.4 Network High None None Un-

changed
High High None 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2
CVE-2017-3507 Oracle Service Bus Web Console Design HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3531 Oracle WebLogic Server Servlet Runtime HTTP Yes 7.2 Network Low None None Changed None Low Low 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2
CVE-2017-3593 Oracle WebCenter Sites Advanced UI HTTP Yes 7.1 Network Low None Required Un-

changed
High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3595 Oracle WebCenter Sites Advanced UI HTTP No 7.1 Network Low Low None Un-

changed
High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3591 Oracle WebCenter Sites Catalog Mover HTTP Yes 7.1 Network Low None Required Un-

changed
Low High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3594 Oracle WebCenter Sites Advanced UI HTTP No 5.9 Network High Low None Un-

changed
High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3597 Oracle WebCenter Sites Advanced UI HTTP No 5.7 Network Low Low Required Un-

changed
High None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3626 Oracle GlassFish Server Java Server Faces Multiple Yes 3.1 Network High None Required Un-

changed
Low None None 3.1.2
CVE-2017-3598 Oracle WebCenter Sites Advanced UI HTTP No 3.1 Network High Low None Un-

changed
Low None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0
CVE-2017-3603 Oracle WebCenter Sites Advanced UI HTTP No 3.1 Network High Low None Un-

changed
Low None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706, and CVE-2016-0763.
  • The fix for CVE-2016-1181 also addresses CVE-2012-1007, CVE-2014-0114, and CVE-2016-1182.
  • The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix – Oracle Hyperion

Oracle Hyperion Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Hyperion. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hyperion Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2015-3237 Oracle Hyperion Essbase Security (libcurl) HTTP Yes 6.5 Network Low None None Un-

changed
Low None Low 11.1.2.2

Additional CVEs addressed are below:

  • The fix for CVE-2015-3237 also addresses CVE-2015-3236.

Appendix – Oracle Enterprise Manager Grid Control

Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle Enterprise Manager Grid Control. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-3092 Enterprise Manager Base Platform Security Framework HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.1.0, 13.1.0, 13.2.0
CVE-2017-3518 Enterprise Manager Base Platform Discovery Framework HTTPS Yes 7.5 Network Low None None Un-

changed
None None High 12.1.0, 13.1.0, 13.2.0

Additional CVEs addressed are below:

  • The fix for CVE-2017-3518 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix – Oracle Applications

Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle E-Business Suite. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2017), My Oracle Support Note 2241313.1.

Some of the risk matrix rows in this section are assigned multiple CVE#s. In these cases, additional CVEs are listed below the risk matrix to improve readability. Each group of CVE identifiers share the same description, vulnerability type, Component, Sub-Component and affected versions listed in the risk matrix entry, but occur in different code sections within a Sub-Component.

Oracle E-Business Suite Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3549 Oracle Scripting Scripting Administration HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3393 Oracle Advanced Outbound Telephony Interaction History HTTP Yes 8.2 Network Low None Required Changed High Low None 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3550 Oracle Customer Interaction History Admin Console HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3
CVE-2017-3337 Oracle Marketing User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3432 Oracle One-to-One Fulfillment Audience workbench HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3
CVE-2017-3557 Oracle One-to-One Fulfillment Print Server HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3555 Oracle iReceivables Self Registration HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3592 Oracle Payables Self Service Manager HTTP No 6.5 Network Low High None Un-

changed
High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3528 Oracle Applications Framework Popup windows (lists of values, datepicker, etc.) HTTP Yes 4.7 Network Low None Required Changed None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3515 Oracle User Management User Name/Password Management HTTP Yes 4.7 Network Low None Required Changed None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
CVE-2017-3556 Oracle Application Object Library File Management HTTP Yes 3.7 Network High None None Un-

changed
Low None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

Additional CVEs addressed are below:

  • The fix for CVE-2017-3337 also addresses CVE-2017-3342, CVE-2017-3345, CVE-2017-3347, CVE-2017-3355, and CVE-2017-3356.
  • The fix for CVE-2017-3432 also addresses CVE-2017-3434.

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 1 new security fix for the Oracle Supply Chain Products Suite. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Supply Chain Products Suite Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3530 Oracle Transportation Manager Security HTTP No 6.1 Network Low High Required Un-

changed
High High None 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, 6.4.1, 6.4.2

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 16 new security fixes for Oracle PeopleSoft Products. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle PeopleSoft Products Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3519 PeopleSoft Enterprise PeopleTools Security HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.54, 8.55
CVE-2017-3547 PeopleSoft Enterprise PeopleTools MultiChannel Framework HTTP Yes 7.4 Network Low None Required Changed None High None 8.54, 8.55
CVE-2017-3577 PeopleSoft Enterprise CS Campus Community Frameworks HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3570 PeopleSoft Enterprise FSCM eSettlements HTTP No 6.5 Network Low High None Un-

changed
High High None 9.1
CVE-2017-3520 PeopleSoft Enterprise PeopleTools Fluid Core HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 8.54, 8.55
CVE-2017-3548 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 6.5 Network Low None None Un-

changed
Low None Low 8.54, 8.55
CVE-2017-3546 PeopleSoft Enterprise PeopleTools MultiChannel Framework HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None 8.54, 8.55
CVE-2014-3596 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None 8.54, 8.55
CVE-2017-3521 PeopleSoft Enterprise SCM Purchasing Supplier Registration HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3525 PeopleSoft Enterprise SCM Service Procurement Usability HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3524 PeopleSoft Enterprise SCM Strategic Sourcing Bidder Registration HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3571 PeopleSoft Enterprise SCM eBill Payment Security HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3522 PeopleSoft Enterprise SCM eSupplier Connection Vendor HTTP No 6.5 Network Low High None Un-

changed
High High None 9.2
CVE-2017-3502 PeopleSoft Enterprise FIN Receivables Receivables HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 9.2
CVE-2017-3527 PeopleSoft Enterprise PeopleTools Fluid Core HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.54, 8.55
CVE-2017-3536 PeopleSoft Enterprise PeopleTools Security HTTP No 4.6 Network Low Low Required Un-

changed
Low Low None 8.54, 8.55

Oracle JD Edwards Products Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle JD Edwards Products. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle JD Edwards Products Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3517 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.5 Network Low None None Un-

changed
Low None Low 9.2

Oracle Siebel CRM Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Siebel CRM. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Siebel CRM Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 Siebel Apps – E-Billing Security (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1, 6.2, 7.0, 7.1

Oracle Commerce Executive Summary

This Critical Patch Update contains 3 new security fixes for Oracle Commerce. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Commerce Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3572 Oracle Commerce Guided Search / Oracle Commerce Experience Manager MDEX HTTP Yes 7.5 Network Low None None Un-

changed
None None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2
CVE-2016-6304 Oracle Commerce Guided Search / Oracle Commerce Experience Manager MDEX HTTPS Yes 7.5 Network Low None None Un-

changed
None None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2
CVE-2016-2107 Oracle Commerce Guided Search / Oracle Commerce Experience Manager Platform Services HTTPS Yes 5.9 Network High None None Un-

changed
High None None 6.1.4, 11.0, 11.1, 11.2

Additional CVEs addressed are below:

  • The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, and CVE-2016-2176.
  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6306, CVE-2016-7052, CVE-2016-7055, CVE-2017-3731, and CVE-2017-3732.

Appendix – Oracle Communications Applications

Oracle Communications Applications Executive Summary

This Critical Patch Update contains 11 new security fixes for Oracle Communications Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Communications Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 Oracle Communications Policy Management Security (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 12.2
CVE-2016-0729 Oracle Communications ASAP Security (Xerces) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.0, 7.2, 7.3
CVE-2016-0635 Oracle Communications Network Integrity Security (Spring) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.3.0, 7.2.4
CVE-2016-3092 Oracle Communications Service Broker Engineered System Edition Install (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 6.0, 6.1
CVE-2013-5209 Oracle Communications Session Border Controller Sysadmin (SCTP) SCTP Yes 7.5 Network Low None None Un-

changed
High None None SCZ7.2.0, SCZ7.3.0, SCZ7.4.0
CVE-2016-6304 Oracle Communications Session Border Controller Routing (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High SCZ7.2.0, SCZ7.3.0, SCZ7.4.0
CVE-2012-0920 Oracle Communications Session Border Controller Sysadmin (Dropbear) SSH No 7.1 Network High Low Required Un-

changed
High High High SCZ7.2.0, SCZ7.3.0, SCZ7.4.0
CVE-2017-3732 Oracle Communications Security Gateway Routing (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 3.0.0
CVE-2013-2566 Oracle Communications Session Border Controller Sysadmin SSH Yes 5.9 Network High None None Un-

changed
High None None SCZ7.3.0, SCZ7.4.0
CVE-2017-3470 Oracle Communications Security Gateway Network ICMP Ping Yes 5.3 Network Low None None Un-

changed
None None Low 3.0.0
CVE-2015-0204 Oracle Communications Session Border Controller Routing TLS Yes 5.3 Network Low None None Un-

changed
None Low None SCZ7.2.0,

SCZ7.3.0, SCZ7.4.0

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2014-3571, CVE-2015-0286, CVE-2015-1791, CVE-2015-3195, and CVE-2016-2107.
  • The fix for CVE-2017-3732 also addresses CVE-2014-3571, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, and CVE-2015-1792.

Appendix – Oracle Financial Services Applications

Oracle Financial Services Applications Executive Summary

This Critical Patch Update contains 47 new security fixes for Oracle Financial Services Applications. 25 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Financial Services Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 Oracle FLEXCUBE Private Banking Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 12.0.1, 12.0.2, 12.0.3, 12.1.0
CVE-2017-5638 Oracle Financial Services Analytical Applications Infrastructure Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 7.3.3, 7.3.4, 7.3.5
CVE-2017-5638 Oracle Financial Services Asset Liability Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Basel Regulatory Capital Basic Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.2, 6.1.3, 8.0.2, 8.0.3
CVE-2017-5638 Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.2, 6.1.3, 8.0.2, 8.0.3
CVE-2017-5638 Oracle Financial Services Data Foundation Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Data Integration Hub Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Enterprise Financial Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4
CVE-2017-5638 Oracle Financial Services Funds Transfer Pricing Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Hedge Management and IFRS Valuations Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Institutional Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4
CVE-2017-5638 Oracle Financial Services Liquidity Risk Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.4
CVE-2017-5638 Oracle Financial Services Loan Loss Forecasting and Provisioning Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 1.5.0, 1.5.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Pricing Management/Transfer Pricing Component Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4
CVE-2017-5638 Oracle Financial Services Profitability Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2017-5638 Oracle Financial Services Reconciliation Framework Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0, 8.0.1, 8.0.2
CVE-2017-5638 Oracle Financial Services Retail Customer Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.3
CVE-2017-5638 Oracle Financial Services Retail Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4
CVE-2017-5638 Oracle Insurance Data Foundation Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4
CVE-2016-0635 Oracle FLEXCUBE Private Banking Core (Spring Framework) HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.0.1, 12.0.2, 12.0.3, 12.1.0
CVE-2017-3493 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP No 8.5 Network Low Low None Changed High None Low 12.0.0, 12.1.0
CVE-2017-3472 Oracle FLEXCUBE Private Banking Portfolio Management HTTP No 8.1 Network Low Low None Un-

changed
High High None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1
CVE-2017-3476 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 7.1 Network Low Low None Un-

changed
High Low None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1
CVE-2017-3485 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.8 Network High Low None Un-

changed
None High High 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0
CVE-2017-3491 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 6.5 Network Low Low None Un-

changed
High None None 12.0.1, 12.1.0
CVE-2017-3488 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 6.5 Network Low Low None Un-

changed
None High None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0
CVE-2017-3534 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.5 Network Low Low None Un-

changed
High None None 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-3496 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.0.0, 12.1.0
CVE-2017-3492 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.0.0, 12.1.0
CVE-2017-3484 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.0.0, 12.1.0
CVE-2017-3489 Oracle FLEXCUBE Investor Servicing Security Management System HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0
CVE-2017-3288 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0
CVE-2017-3478 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 12.0.0, 12.1.0
CVE-2017-3479 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.4 Network Low Low None Un-

changed
None Low Low 2.0.0, 2.0.1, 2.2.0.1, 12.0.1
CVE-2017-3482 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.4 Network Low Low Required Changed Low Low None 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0
CVE-2017-3475 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.0 Network Low Low None Changed None None Low 2.0.0, 2.0.1, 2.2.0.1, 12.0.1
CVE-2017-3495 Oracle FLEXCUBE Direct Banking Pre-Login HTTP Yes 4.7 Network Low None Required Changed Low None None 12.0.2, 12.0.3
CVE-2017-3471 Oracle FLEXCUBE Private Banking Miscellaneous HTTP Yes 4.7 Network Low None Required Changed None Low None 12.0.0, 12.1.0
CVE-2017-3480 Oracle FLEXCUBE Universal Banking Infrastructure HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1
CVE-2017-3535 Oracle FLEXCUBE Universal Banking Infrastructure HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3
CVE-2017-3494 Oracle FLEXCUBE Universal Banking Retail Teller HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3
CVE-2017-3483 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral None No 4.4 Local Low High None Un-

changed
High None None 12.0.0, 12.1.0
CVE-2017-3473 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.3 Network Low Low None Un-

changed
Low None None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1
CVE-2017-3481 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 4.3 Network Low Low None Un-

changed
None None Low 11.3.0, 11.4.0, 12.0.1
CVE-2017-3477 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.2 Network High Low None Un-

changed
Low Low None 12.0.0, 12.1.0
CVE-2017-3490 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 3.1 Network High Low None Un-

changed
Low None None 12.0.0, 12.1.0
CVE-2017-3487 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 3.1 Network High Low None Un-

changed
None Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

Appendix – Oracle Health Sciences Applications

Oracle Health Sciences Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Health Sciences Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Health Sciences Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-3092 Oracle Healthcare Master Person Index Cleanser, Profiler (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to and 2.0.1.x, 3.0.0.x and 4.0.1.x

Appendix – Oracle Hospitality Applications

Oracle Hospitality Applications Executive Summary

This Critical Patch Update contains 6 new security fixes for Oracle Hospitality Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hospitality Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3574 Oracle Hospitality OPERA 5 Property Services OPERA License code configuration HTTP No 7.1 Network Low Low None Un-

changed
High Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x
CVE-2017-3568 Oracle Hospitality OPERA 5 Property Services OPERA Printing and Login None No 6.5 Local High None Required Un-

changed
High High Low 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x
CVE-2017-3573 Oracle Hospitality OPERA 5 Property Services OPERA Printing HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x
CVE-2017-3569 Oracle Hospitality OPERA 5 Property Services OPERA Business Events HTTP No 5.4 Network Low Low None Un-

changed
Low Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x
CVE-2017-3552 Oracle Hospitality OPERA 5 Property Services OPERA Room Image/Picture Setup HTTP No 4.3 Network Low Low None Un-

changed
Low None None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x
CVE-2017-3560 Oracle Hospitality OPERA 5 Property Services OXI Interface HTTP No 4.3 Network Low Low None Un-

changed
Low None None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

Appendix – Oracle Insurance Applications

Oracle Insurance Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Insurance Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Insurance Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2015-7940 Oracle Insurance Istream IStream Publisher (Bouncy Castle) HTTP No 6.5 Network Low Low None Un-

changed
High None None 4.3.2 and prior

Appendix – Oracle Retail Applications

Oracle Retail Applications Executive Summary

This Critical Patch Update contains 39 new security fixes for Oracle Retail Applications. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Retail Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 Oracle Retail XBRi Loss Prevention Internal Operations (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1
CVE-2016-0635 Oracle Retail Back Office Security HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.1
CVE-2016-0635 Oracle Retail Invoice Matching Security HTTP No 8.8 Network Low Low None Un-

changed
High High High 13.2, 14.0, 14.1
CVE-2016-0635 Oracle Retail Point-of-Service Infrastructure HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.1.3
CVE-2016-0635 Oracle Retail Point-of-Service Mobile POS HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.1.3
CVE-2016-0635 Oracle Retail Returns Management Security HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.1
CVE-2016-3506 MICROS Lucas Security Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 2.9.5.1, 2.9.5.2, 2.9.5.3, 2.9.5.4, 2.9.5.5
CVE-2016-3506 MICROS Relate CRM Software Web Services Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 10.0, 10.5, 10.8, 11.0, 11.1, 11.4, 15.0
CVE-2016-3506 MICROS XBR Database Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1
CVE-2016-3506 MICROS Xstore Payment Security Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0
CVE-2016-3506 Oracle Retail Advanced Inventory Planning Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1, 15.0
CVE-2016-3506 Oracle Retail Advanced Science Engine General Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1
CVE-2016-3506 Oracle Retail Analytic Parameter Calculator – RO Data Interface Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-3506 Oracle Retail Analytic Parameter Calculator – RO Installation/Configuration Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-3506 Oracle Retail Analytics Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.0, 14.1, 15.0, 16.0
CVE-2016-3506 Oracle Retail Assortment Planning Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.1, 16.0.0
CVE-2016-3506 Oracle Retail Category Management Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 13.2, 13.3, 14.0, 14.1
CVE-2016-3506 Oracle Retail Category Management Planning & Optimization Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-3506 Oracle Retail Customer Insights Installer Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-2510 Oracle Retail Customer Management and Segmentation Foundation Web Services HTTPS Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-3506 Oracle Retail Demand Forecasting Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Item Planning Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Macro Space Optimization Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0.2
CVE-2016-3506 Oracle Retail Merchandise Financial Planning Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Merchandising Insights Installer Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 15.0
CVE-2016-3506 Oracle Retail Order Broker Order Broker Foundation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 5.1, 5.2, 15.0, 16.0
CVE-2016-3506 Oracle Retail Predictive Application Server Installer – Server Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 13.1, 13.2, 13.3, 13.4, 14.0, 14.1, 15.0
CVE-2016-3506 Oracle Retail Regular Price Optimization Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Replenishment Optimization Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Size Profile Optimization Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1.3, 15.0.2
CVE-2016-3506 Oracle Retail Store Inventory Installation Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 14.1, 15.0, 16.0
CVE-2016-3506 Oracle Retail Xstore Point of Service Point of Sale Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 5.5, 6.0, 6.5, 7.1, 15.0
CVE-2016-3506 Oracle Retail Xstore Point of Service Point of Sale Oracle Net Yes 8.1 Network High None None Un-

changed
High High High 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0
CVE-2016-1181 Oracle Retail Invoice Matching Security None No 7.8 Local Low Low None Un-

changed
High High High 12.0, 13.0, 13.1, 13.2, 14.0, 14.1
CVE-2017-3254 Oracle Retail Invoice Matching Security HTTP Yes 7.6 Network Low None Required Un-

changed
High Low Low 12.0, 13.0
CVE-2015-7940 Oracle Retail Open Commerce Platform Framework HTTP Yes 7.5 Network Low None None Un-

changed
High None None 4.0, 5.0, 5.1, 5.3, 6.0
CVE-2015-0204 Oracle Retail Predictive Application Server RPAS Server SSL/TLS Yes 7.5 Network Low None None Un-

changed
None None High 13.3.3, 13.4.3, 14.0.3, 14.1.3, 15.0.2, 16.0.0
CVE-2017-3532 Oracle Retail Warehouse Management System Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 13.2, 14.0, 15.0
CVE-2017-3451 Oracle Retail Open Commerce Platform Web HTTP No 5.4 Network Low Low Required Changed Low Low None 4.0, 5.0, 5.1, 5.3, 6.0, 6.1, 15.0, 16.0

Additional CVEs addressed are below:

  • The fix for CVE-2015-0204 also addresses CVE-2014-3571.
  • The fix for CVE-2016-1181 also addresses CVE-2014-0114, and CVE-2016-1182.
  • The fix for CVE-2017-5638 also addresses CVE-2016-4436.

Appendix – Oracle Utilities Applications

Oracle Utilities Applications Executive Summary

This Critical Patch Update contains 7 new security fixes for Oracle Utilities Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Utilities Applications Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-5019 Oracle Utilities Customer Self Service Packaging (Apache Trinidad) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 2.1.0.2.0
CVE-2014-0114 Oracle Utilities Framework System Wide HTTP Yes 8.3 Network Low None None Changed Low Low Low 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0
CVE-2016-3092 Oracle Utilities Framework File Uploads and Attachments (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0
CVE-2016-3674 Oracle Utilities Framework UI, Batch and XAI (Xstream) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0
CVE-2016-3092 Oracle Utilities Work and Asset Management Integrations (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.9.1.2.11
CVE-2017-3537 Oracle Real-Time Scheduler Mobile Communications Platform HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.2.0.3.13, 2.3.0.0, 2.3.0.1
CVE-2012-5881 Oracle Utilities Framework UI (YUI JavaScript framework) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

Additional CVEs addressed are below:

  • The fix for CVE-2012-5881 also addresses CVE-2012-5882, and CVE-2012-5883.

Appendix – Oracle Primavera Products Suite

Oracle Primavera Products Suite Executive Summary

This Critical Patch Update contains 7 new security fixes for the Oracle Primavera Products Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Primavera Products Suite Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3503 Primavera P6 Enterprise Project Portfolio Management Web Access (Apache Commons BeanUtils) HTTP No 9.9 Network Low Low None Changed High High High 8.3, 8.4, 15.1, 15.2, 16.1, 16.2
CVE-2017-3508 Primavera Gateway Primavera Desktop Integration HTTP No 9.1 Network Low High None Changed High High High 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2
CVE-2017-3500 Primavera Gateway Primavera Desktop Integration HTTP No 8.7 Network Low High None Changed High None High 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2
CVE-2017-3583 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP Yes 8.1 Network Low None Required Un-

changed
High High None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2
CVE-2017-3579 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2
CVE-2017-3501 Primavera Unifier Platform HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.13, 9.14, 10.0, 10.1, 15.1, 15.2
CVE-2017-3732 Primavera P6 Enterprise Project Portfolio Management Project Manager (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
High None None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2

Additional CVEs addressed are below:

  • The fix for CVE-2017-3503 also addresses CVE-2014-0114.

Appendix – Oracle Java SE

Oracle Java SE Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Java SE. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.


The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are “Low” instead of “High”, lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.


Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

Oracle Java SE Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3512 Java SE AWT Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 7u131, 8u121 See Note 1
CVE-2017-3514 Java SE AWT Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 6u141, 7u131, 8u121 See Note 1
CVE-2017-3511 Java SE, Java SE Embedded, JRockit JCE None No 7.7 Local High None Required Changed High High High Java SE: 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2
CVE-2017-3526 Java SE, Java SE Embedded, JRockit JAXP Multiple Yes 5.9 Network High None None Un-

changed
None None High Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2
CVE-2017-3509 Java SE, Java SE Embedded Networking Multiple Yes 4.2 Network High None Required Un-

changed
Low Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121 See Note 1
CVE-2017-3533 Java SE, Java SE Embedded, JRockit Networking FTP Yes 3.7 Network High None None Un-

changed
None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2
CVE-2017-3544 Java SE, Java SE Embedded, JRockit Networking SMTP Yes 3.7 Network High None None Un-

changed
None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2
CVE-2017-3539 Java SE, Java SE Embedded Security Multiple Yes 3.1 Network High None Required Un-

changed
None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121 See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Appendix – Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 21 new security fixes for the Oracle Sun Systems Products Suite. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3623 Solaris Kernel RPC Multiple Yes 10.0 Network Low None None Changed High High High None See Note 1
CVE-2016-3607 Solaris Cluster GlassFish Server Multiple Yes 9.8 Network Low None None Un-

changed
High High High 4.3
CVE-2016-5019 StorageTek Tape Analytics SW Tool Core (Apache Trinidad) Multiple Yes 9.8 Network Low None None Un-

changed
High High High Prior to 2.2.1
CVE-2015-4852 StorageTek Tape Analytics SW Tool WebLogic Server T3 Yes 9.8 Network Low None None Un-

changed
High High High Prior to 2.2.1
CVE-2015-7501 StorageTek Tape Analytics SW Tool Core (Apache Commons Collections) Multiple No 8.8 Network Low Low None Un-

changed
High High High Prior to 2.2.1
CVE-2017-3578 Sun ZFS Storage Appliance Kit (AK) RAS subsystems None No 8.8 Local Low Low None Changed High High High AK 2013
CVE-2017-3582 Oracle SuperCluster Specific Software Backup/Restore Utility None No 8.4 Local Low None None Un-

changed
High High High 2.3.8, 2.3.13
CVE-2017-3580 Sun ZFS Storage Appliance Kit (AK) RAS subsystems Multiple Yes 8.3 Network High None Required Changed High High High AK 2013
CVE-2017-3564 Solaris RBAC None No 8.2 Local Low Low Required Changed High High High 11.3
CVE-2017-3565 Solaris RBAC None No 7.9 Local Low Low Required Changed High High None 11.3
CVE-2017-3622 Solaris Common Desktop Environment (CDE) None No 7.8 Local Low Low None Un-

changed
High High High 10 See Note 2
CVE-2017-3584 Sun ZFS Storage Appliance Kit (AK) RAS subsystems None No 7.8 Local High Low None Changed High High High AK 2013
CVE-2017-3510 Solaris Kernel Zones virtualized NIC driver Multiple No 7.7 Network Low Low None Changed None High None 11.3
CVE-2017-3516 Solaris Kernel Zones virtualized NIC driver Multiple No 7.7 Network Low Low None Changed None None High 11.3
CVE-2017-3621 Sun ZFS Storage Appliance Kit (AK) IPC Frameworks Multiple Yes 7.5 Network Low None None Un-

changed
None None High AK 2013
CVE-2017-3497 Solaris Remote Administration Daemon Multiple Yes 7.3 Network Low None None Un-

changed
Low Low Low 11.3
CVE-2017-3551 Solaris Smartcard Libraries None No 6.6 Local Low Low None Un-

changed
Low Low High 11.3
CVE-2017-3585 Sun ZFS Storage Appliance Kit (AK) User Interface subsystem HTTP Yes 5.3 Network Low None None Un-

changed
None Low None AK 2013
CVE-2017-3498 Solaris Kernel None No 3.3 Local Low Low None Un-

changed
Low None None 11.3
CVE-2017-3474 Solaris Zone None No 3.3 Local Low Low None Un-

changed
Low None None 11.3
CVE-2016-5551 Solaris Cluster NAS device addition None No 3.3 Local Low None Required Un-

changed
Low None None 4.3

Notes:

  1. CVE-2017-3623 is assigned for “Ebbisland”. Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue.
  2. CVE-2017-3622 is assigned for the “Extremeparr”.

Additional CVEs addressed are below:

  • The fix for CVE-2016-5019 also addresses CVE-2016-3504.

Appendix – Oracle Linux and Virtualization

Oracle Virtualization Executive Summary

This Critical Patch Update contains 15 new security fixes for Oracle Virtualization. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Virtualization Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2016-5407 Secure Global Desktop Window System (X11) TCP Yes 9.8 Network Low None None Un-

changed
High High High 4.71, 5.2, 5.3
CVE-2017-3561 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3563 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3576 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3558 Oracle VM VirtualBox Core None No 8.5 Local Low None None Changed Low Low High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3587 Oracle VM VirtualBox Shared Folder None No 8.4 Local Low Low None Changed None High High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3559 Oracle VM VirtualBox Core None No 7.9 Local Low Low None Changed Low Low High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3575 Oracle VM VirtualBox Core None No 7.9 Local Low High None Changed None High High Prior to 5.0.38, Prior to 5.1.20
CVE-2017-3538 Oracle VM VirtualBox Shared Folder None No 7.5 Local High Low None Changed High High None Prior to 5.0.34, Prior to 5.1.16
CVE-2017-3731 Secure Global Desktop Core (OpenSSL) SSL/TLS Yes 5.9 Network High None None Un-

changed
None None High 4.71, 5.2, 5.3
CVE-2013-1982 Secure Global Desktop Window System (X11) TCP Yes 5.6 Network High None None Un-

changed
Low Low Low 4.71
CVE-2016-3739 Secure Global Desktop Core (LibcURL) Multiple Yes 4.8 Network High None None Un-

changed
Low Low None 5.2, 5.3
CVE-2016-8743 Secure Global Desktop Web Server (Apache HTTP Server) HTTP Yes 4.0 Network High None None Changed Low None None 4.71, 5.2, 5.3
CVE-2016-0762 Secure Global Desktop Application Server (Apache Tomcat) HTTP Yes 3.7 Network High None None Un-

changed
Low None None 4.71, 5.2, 5.3
CVE-2017-3513 Oracle VM VirtualBox Core None No 2.5 Local High High None Changed Low None None Prior to 5.0.38, Prior to 5.1.20

Additional CVEs addressed are below:

  • The fix for CVE-2013-1982 also addresses CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987, CVE-2013-1995, CVE-2013-1998, CVE-2013-2002, CVE-2013-2003, and CVE-2013-2005.
  • The fix for CVE-2016-0762 also addresses CVE-2016-5018, CVE-2016-6794, CVE-2016-6796, CVE-2016-6797, CVE-2016-6816, CVE-2016-6817, and CVE-2016-8735.
  • The fix for CVE-2016-3739 also addresses CVE-2016-4802, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, and CVE-2016-8625.
  • The fix for CVE-2017-3731 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-7055, CVE-2017-3730, and CVE-2017-3732.

Appendix – Oracle MySQL

Oracle MySQL Executive Summary

This Critical Patch Update contains 40 new security fixes for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle MySQL Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-5638 MySQL Enterprise Monitor Monitoring: General (Struts 2) MySQL Protocol Yes 10.0 Network Low None None Changed High High High 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier,
CVE-2016-6303 MySQL Workbench Workbench: Security: Encryption (OpenSSL) MySQL Protocol Yes 9.8 Network Low None None Un-

changed
High High High 6.3.8 and earlier
CVE-2017-3523 MySQL Connectors Connector/J MySQL Protocol No 8.5 Network High Low None Changed High High High 5.1.40 and eariler
CVE-2017-3306 MySQL Enterprise Monitor Monitoring: Server MySQL Protocol No 8.3 Network Low High Required Changed High High Low 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier
CVE-2016-2176 MySQL Enterprise Backup Backup: ENTRBACK (OpenSSL) MySQL Protocol Yes 8.2 Network Low None None Un-

changed
Low None High 3.12.2 and earlier, 4.0.1 and earlier
CVE-2016-2176 MySQL Workbench Workbench: Security: Encryption (OpenSSL) MySQL Protocol Yes 8.2 Network Low None None Un-

changed
Low None High 6.3.7 and earlier
CVE-2017-3308 MySQL Server Server: DML MySQL Protocol No 7.7 Network Low Low None Changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3309 MySQL Server Server: Optimizer MySQL Protocol No 7.7 Network Low Low None Changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3450 MySQL Server Server: Memcached MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3599 MySQL Server Server: Pluggable Auth MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3329 MySQL Server Server: Thread Pooling MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3600 MySQL Server Client mysqldump MySQL Protocol No 6.6 Network High High None Un-

changed
High High High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier See Note 1
CVE-2016-3092 MySQL Enterprise Monitor Monitoring: General (Apache Commons FileUpload) MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier
CVE-2017-3331 MySQL Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.7.11 to 5.7.17
CVE-2017-3453 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3452 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.6.35 and earlier
CVE-2017-3586 MySQL Connectors Connector/J MySQL Protocol No 6.4 Network Low Low None Changed Low Low None 5.1.41 and earlier
CVE-2017-3732 MySQL Enterprise Backup Backup: ENTRBACK (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 3.12.3 and earlier, 4.0.3 and earlier
CVE-2017-3731 MySQL Enterprise Monitor Monitoring: General (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un-

changed
High None None 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier
CVE-2017-3454 MySQL Server Server: InnoDB MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 5.7.17 and earlier
CVE-2017-3304 MySQL Cluster Cluster: DD MySQL Protocol No 5.4 Network Low Low None Un-

changed
None Low Low 7.2.27 and earlier, 7.3.16 and earlier, 7.4.14 and earlier, 7.5.5 and earlier
CVE-2017-3455 MySQL Server Server: Security: Privileges MySQL Protocol No 5.4 Network Low Low None Un-

changed
Low Low None 5.7.17 and earlier
CVE-2017-3305 MySQL Server Server: C API MySQL Protocol No 5.3 Network High Low None Un-

changed
High None None 5.5.55 and earlier, 5.6.35 and earlier
CVE-2017-3302 MySQL Server Server: C API MySQL Protocol No 5.1 Local High None None Un-

changed
None None High 5.5.54 and earlier, 5.6.20 and earlier
CVE-2017-3460 MySQL Server Server: Audit Plug-in MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.17 and earlier
CVE-2017-3456 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3458 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.17 and earlier
CVE-2017-3457 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.17 and earlier
CVE-2017-3459 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.17 and earlier
CVE-2017-3463 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3462 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3461 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3464 MySQL Server Server: DDL MySQL Protocol No 4.3 Network Low Low None Un-

changed
None Low None 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier
CVE-2017-3465 MySQL Server Server: Security: Privileges MySQL Protocol No 4.3 Network Low Low None Un-

changed
None Low None 5.7.17 and earlier
CVE-2017-3467 MySQL Server Server: C API MySQL Protocol Yes 3.7 Network High None None Un-

changed
Low None None 5.7.17 and earlier
CVE-2017-3469 MySQL Workbench Workbench: Security : Encryption MySQL Protocol Yes 3.7 Network High None None Un-

changed
Low None None 6.3.8 and earlier
CVE-2017-3589 MySQL Connectors Connector/J MySQL Protocol No 3.3 Local Low Low None Un-

changed
None Low None 5.1.41 and earlier
CVE-2017-3590 MySQL Connectors Connector/Python None No 3.3 Local Low Low None Un-

changed
None Low None 2.1.5 and earlier
CVE-2017-3307 MySQL Enterprise Monitor Monitoring: Server MySQL Protocol No 3.1 Network High High Required Un-

changed
None Low Low 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier
CVE-2017-3468 MySQL Server Server: Security: Encryption MySQL Protocol No 3.1 Network High Low None Un-

changed
None Low None 5.7.17 and earlier

Notes:

  1. CVE-2017-3600 is equivalent to CVE-2016-5483.

Additional CVEs addressed are below:

  • The fix for CVE-2016-2176 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-2109.
  • The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, and CVE-2016-6306.
  • The fix for CVE-2017-3731 also addresses CVE-2016-7055, and CVE-2017-3732.
  • The fix for CVE-2017-3732 also addresses CVE-2016-7055, and CVE-2017-3731.

Appendix – Oracle Support Tools

Oracle Support Tools Executive Summary

This Critical Patch Update contains 13 new security fixes for Oracle Support Tools. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Support Tools Risk Matrix

CVE# Component Sub-

component
Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2017-3234 Automatic Service Request (ASR) ASR Manager SFT Yes 9.8 Network Low None None Un-

changed
High High High Prior to 5.7
CVE-2017-3237 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un-

changed
High High High Prior to 5.7
CVE-2017-3581 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un-

changed
High High High Prior to 5.7
CVE-2017-3620 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un-

changed
High High High Prior to 5.7
CVE-2017-3233 Automatic Service Request (ASR) ASR Manager HTTP Yes 7.5 Network Low None None Un-

changed
None High None Prior to 5.7
CVE-2016-6304 OSS Support Tools Oracle Explorer (OpenSSL) SSL/TLS Yes 7.5 Network Low None None Un-

changed
None None High Prior to RDA 8.15.17.3.14
CVE-2015-5252 Oracle Advanced Support Gateway Samba Service SMB Yes 7.2 Network Low None None Changed Low Low None Prior to 7.2
CVE-2017-3618 Automatic Service Request (ASR) ASR Manager None No 7.1 Local Low Low None Un-

changed
High High None Prior to 5.7
CVE-2017-3232 Automatic Service Request (ASR) ASR Manager None No 5.5 Local Low Low None Un-

changed
High None None Prior to 5.7
CVE-2017-3619 Automatic Service Request (ASR) ASR Manager None No 5.5 Local Low Low None Un-

changed
High None None Prior to 5.7
CVE-2017-3504 Automatic Service Request (ASR) ASR Manager None No 5.1 Local Low None None Un-

changed
None Low Low Prior to 5.7
CVE-2017-3505 Automatic Service Request (ASR) ASR Manager None No 5.1 Local Low None None Un-

changed
None Low Low Prior to 5.7
CVE-2004-2761 Oracle Trace File Analyzer (TFA) TFA Collector Multiple No 4.3 Network Low Low None Un-

changed
None Low None Prior to 12.1.2.8.4

Additional CVEs addressed are below:

  • The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Related:

  • No Related Posts