ID
VAR-201004-0739
TITLE
RETIRED: Oracle April 2010 Critical Patch Update Multiple Vulnerabilities
Trust: 0.3
DESCRIPTION
Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software: Oracle Database Oracle Fusion Middleware Oracle Collaboration Suite Oracle E-Business Suite Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Oracle Industry Suite Oracle Solaris Products The following individual records exist to better document these issues: 39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities 39459 Oracle Solaris CVE-2010-0890 Local Vulnerability 39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability 39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability 39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability 39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability 39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability 39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability 39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability 39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability 39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability 39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability 39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability 39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability 39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability 39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability 39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability 39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability 39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability 39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability 39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability 39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability 39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability 39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability 39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability 39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability 39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability 39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability 39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability 39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability 39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability 39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability 39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability 39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability 39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability 39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability 39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability 39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability 39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability 39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability 39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability 39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability 37926 Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability 39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability 39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability 35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability 34961 Cyrus SASL 'sasl_encode64()' Remote Buffer Overflow Vulnerability 38016 Sun Solaris 'CODE_GET_VERSION IOCTL' Local Denial Of Service Vulnerability
Trust: 0.3
AFFECTED PRODUCTS
vendor: | sun | model: | solaris 9 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 9 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 8 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 8 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 10 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 10 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 3.1.1 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 1.3 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 1.2 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 3.5 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | sun | model: | ray server software | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | sun | model: | management center | scope: | eq | version: | 3.6.1 | Trust: 0.3 |
vendor: | sun | model: | management center | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | sun | model: | management center | scope: | eq | version: | 3.6 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 6.3.1 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | sun | model: | java system directory server enterprise edition | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | sun | model: | java system directory server patch6 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server patch4 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server patch3 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server patch2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server 2005q4 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server 2005q1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server 2004q2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server 2003q4 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | sun | model: | java system directory server 2004q2 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | sun | model: | java system communications express | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | sun | model: | java system communications express 2005q4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | java system communications express 2005q1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | java system communications express 2004q2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | java system communications express | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | sun | model: | java system access manager windows | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | sun | model: | java system access manager solaris | scope: | eq | version: | 7.1x86 | Trust: 0.3 |
vendor: | sun | model: | java system access manager solaris sparc | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | sun | model: | java system access manager linux | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | sun | model: | java system access manager hp-ux | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q4 windows | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q4 solaris | scope: | eq | version: | 7.0x | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q4 solaris s | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q4 linux | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q4 hp-ux | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 | scope: | eq | version: | 6.3x86 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 sparc | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 linux | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2004q2 solaris | scope: | eq | version: | 6.2x | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2004q2 solaris s | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2004q2 linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | sun | model: | java system access manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | sun | model: | java system access manager | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 windows | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 solaris | scope: | eq | version: | 6x86 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 solaris spa | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | sun | model: | java system access manager 2005q1 2005q1 | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | sun | model: | convergence | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 3.19/04 | Trust: 0.3 |
vendor: | sun | model: | cluster | scope: | eq | version: | 3.14/04 | Trust: 0.3 |
vendor: | oracle | model: | transportation manager | scope: | eq | version: | 6.0.3 | Trust: 0.3 |
vendor: | oracle | model: | transportation manager | scope: | eq | version: | 5.5.06.00 | Trust: 0.3 |
vendor: | oracle | model: | transportation manager | scope: | eq | version: | 5.5.05.07 | Trust: 0.3 |
vendor: | oracle | model: | thesaurus management system | scope: | eq | version: | 4.6.1 | Trust: 0.3 |
vendor: | oracle | model: | thesaurus management system | scope: | eq | version: | 4.5.2 | Trust: 0.3 |
vendor: | oracle | model: | thesaurus management system | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | oracle | model: | retail plan in-season | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | oracle | model: | retail place in-season | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | oracle | model: | retail markdown optimization | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49.23 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49.21 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49.14 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49.12 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49.9 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.50 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i personal edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition | scope: | eq | version: | 9.2.8.0 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g standard edition | scope: | eq | version: | 11.1.7 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g standard edition | scope: | eq | version: | 11.2.0.1.0 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.2.0.1.0 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.1.0.7 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.1.0.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | identity management 10g | scope: | eq | version: | 10.1.4.3.0 | Trust: 0.3 |
vendor: | oracle | model: | identity management 10g | scope: | eq | version: | 10.1.4.0.1 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 1212.1.2 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 1212.1.1 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 1212.0.5 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 1212.0.4 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite 11i | scope: | eq | version: | 11.5.10 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite 11i | scope: | eq | version: | 11.5.10.2 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 12.0.6 | Trust: 0.3 |
vendor: | oracle | model: | communications unified inventory management | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | oracle | model: | collaboration suite release | scope: | eq | version: | 10.1.2.4 | Trust: 0.3 |
vendor: | oracle | model: | clinical remote data capture option | scope: | eq | version: | 4.5.3 | Trust: 0.3 |
vendor: | oracle | model: | clinical remote data capture option | scope: | eq | version: | 4.6 | Trust: 0.3 |
vendor: | oracle | model: | application server | scope: | eq | version: | 10.1.2.3 | Trust: 0.3 |
vendor: | oracle | model: | agile engineering data management | scope: | eq | version: | 6.1.1.0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Unknown
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 39333 | Trust: 0.3 |
REFERENCES
url: | http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html | Trust: 0.3 |
url: | http://www.oracle.com | Trust: 0.3 |
CREDITS
Oracle
Trust: 0.3
SOURCES
db: | BID | id: | 39333 |
LAST UPDATE DATE
2022-05-17T02:01:26.079000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 39333 | date: | 2010-04-15T01:04:00 |
SOURCES RELEASE DATE
db: | BID | id: | 39333 | date: | 2010-04-08T00:00:00 |