Oracle Security Alert for CVE-2014-7169

Oracle Security Alert for CVE-2014-7169

Description

This Security Alert addresses
multiple publicly disclosed vulnerabilities affecting GNU Bash, specifically CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278.GNU Bash
is a popular open source command line shell incorporated into Linux and other widely used operating systems. These           vulnerabilities affect multiple Oracle products. These           vulnerabilities may be remotely exploitable without           authentication,
i.e. may be exploited over a network without           the need for a username and password. A remote user can           exploit these vulnerabilities to execute arbitrary code on           systems that are running affected versions of Bash.

      

Forthis document, the vulnerabilities listed above                 will be referred
to collectively as CVE-2014-7169.
         

Oracle is investigating and will provide fixes for           affected products as soon as they have been fully tested and           determined to provide effective mitigation against these           vulnerabilities.

       Due to the severity, public disclosure, and             reports of active exploitation of CVE-2014-7169 and the             related vulnerabilities, Oracle strongly recommends that            
customers apply the fixes provided by this Security Alert as             soon as they are released by Oracle.


Affected Products and Versions

      

Please refer to Bash Vulnerabilities - CVE-2014-7169 for a           list of Oracle products and versions that are affected by these           vulnerabilities.That page
will            be updated when new information becomes available.

Patch Availability

      

Patch availability information related to these vulnerabilities can be found on theBash
Vulnerabilities - CVE-2014-7169
page. Note that in some instances, the instructions           on this page or references from this page may include           important steps to take before and after the application of           the relevant patch.

      

Supported Products and Versions

      

Patch availability information is provided only for           product versions that are covered under the Premier Support or           Extended Support phases of theLifetime             
Support Policy
. We recommend that customers remain on           actively supported versions to ensure that they continue to           receive security fixes from Oracle.

      

Product releases that are not under Premier Support or           Extended Support are not tested for the presence of           the vulnerabilities addressed by this Security Alert. However, it is           likely that
earlier versions of affected releases are also           affected by these vulnerabilities.

      

Products in Extended Support

      

Security Alert fixes are available to customers who have           purchased Extended Support under theLifetime             
Support Policy
. Customers must have a valid Extended           Support service contract to apply Security Alert fixes for           products in the Extended Support Phase.

References

Modification History

Date Comments
2014-September-26 Rev 1. Initial Release
2014-September-27 Rev 2. Fixes available for Exalogic
2014-September-28 Rev 3. Tables modified for products affected with and without fixes
2014-September-29 Rev 4. Detailed product information moved to
Bash Vulnerabilities
- CVE-2014-7169


 

Appendix - Oracle Sun Systems Products Suite

             

Oracle Sun Systems Products Suite Executive Summary

This Security Alert contains 1 new security fix for the Oracle Sun Systems Products Suite.   This vulnerability is remotely exploitable without authentication,  i.e.,  may be exploited over a network without the need for a username and password.    The English
text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

            

CVE# Component Protocol Sub-
                         component
Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen-
                         tication
Confiden-
                         tiality
Integrity Avail-
                         ability
CVE-2014-7169 Solaris Multiple Bash Yes 10.0 Network Low None Complete Complete Complete 8,  9,  10,  11 See Note 1

Notes:

  1. The CVSS score is taken from
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169.

 
              

Appendix - Oracle Linux and Virtualization

 

Oracle Linux Executive Summary

This Security Alert contains 1 new security fix for Oracle Linux.   This vulnerability is remotely exploitable without authentication,  i.e.,  may be exploited over a network without the need for a username and password.    The English text form of this
Risk Matrix can be found here.

Oracle Linux Risk Matrix

            

CVE# Component Protocol Sub-
                         component
Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (seeRisk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen-
                         tication
Confiden-
                         tiality
Integrity Avail-
                         ability
CVE-2014-7169 Oracle Linux Multiple Bash Yes 10.0 Network Low None Complete Complete Complete 4,  5,  6,  7 See Note 1

Notes:

  1. The CVSS score is taken from
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169.
时间: 2024-10-22 09:01:48

Oracle Security Alert for CVE-2014-7169的相关文章

Oracle Security Alert for CVE-2014-0160

Oracle Security Alert for CVE-2014-0160 Description This Security Alert addresses CVE-2014-0160 ('Heartbleed'), a publicly disclosed vulnerability which affects multiple OpenSSL versions implemented by various vendors in their products. This vulnerab

oracle提示Alert Log Errors: 12170 TNS-12535/TNS-00505: Operation Timed Out

客户反馈系统经常报会话超时,导致应用测试无法正常进行,经检查alert日志发现 Fatal NI connect error 12170.     VERSION INFORMATION:         TNS for HPUX: Version 11.2.0.4.0 - Production         Oracle Bequeath NT Protocol Adapter for HPUX: Version 11.2.0.4.0 - Production         TCP/IP

Oracle EBS Alert 预警

Alert 是一种Oracle系统中的一种机制,它可以监视系统数据库,在规定的情况下给规定用户一个通知,通知可以是邮件或者其他形式,在标注的系统和客户化系统中都是可以定义使用的.有两种类型的Alert: (1) Event Alert. 事件型的Alert会即时发出消息 (2) Periodic Alert. 周期型根据预定义周期检查数据库然后发出消息 Oracle Alert会在以上两种给定情况下检查(check)数据库,检查时发生的与预定义不符合的情况叫做一个异常 (Exception),检

ORACLE 9.2.0.5 PATCHES FOR LINUX86

oracle --oracle 最新发布的安全警告!The patches listed in the Patch Availability Matrix fix the potential vulnerabilities identified in Oracle Security Alert #68. Future releases of the products affected will contain the fixes by default. Patches are available

Alert Log中“Fatal NI connect error 12170”错误

Alert Log中"Fatal NI connect error 12170"错误 Fatal NI connect error 12170.     VERSION INFORMATION:         TNS for Linux: Version 11.2.0.4.0 - Production         Oracle Bequeath NT Protocol Adapter for Linux: Version 11.2.0.4.0 - Production      

ORACLE之常用FAQ V1.0 (5)

oracle 第五部分.ORACLE网络与安全[Q]如何限定特定IP访问数据库[A]可以利用登录触发器.cmgw或者是在$OREACLE_HOME/network/admin下新增一个protocol.ora文件(有些os可能是. protocol.ora),9i可以直接修改sqlnet.ora:增加如下内容:tcp.validnode_checking=yes#允许访问的iptcp.inited_nodes=(ip1,ip2,--)#不允许访问的iptcp.excluded_nodes=(ip

ORACLE告警日志文件

告警日志介绍   告警日志文件是一类特殊的跟踪文件(trace file).告警日志文件命名一般为alert_<SID>.log,其中SID为ORACLE数据库实例名称.数据库告警日志是按时间顺序记录message和错误信息.   告警日志位置 在ORACLE 10g中,BACKGROUND_DUMP_DEST参数确定了告警日志的位置,但是告警日志的文件名无法修改,告警日志的名称 为:alert_<SID>.log ,其中<SID>是实例的名称.BACKGROUND_D

oracle报错ORA-00353: log corruption due to GoldenGate extract process问题

某客户今天告诉我,一套核心库的备库的日志涨的很快,通过检查发现alert log不断的报错,如下所示:  代码如下 复制代码 Fri Dec 11 20:48:37 2015 Incomplete read from log member '/arch2/2_82548_864474703.dbf'. Trying next member. Incomplete read from log member '/arch2/2_82548_864474703.dbf'. Trying next me

vmware安装cent os 6.5 + oracle 11g xe + jboss eap 6.2 + weblogic 12c+ webshpere mq 7.5

前言: mac系统发展速度确实很快,短短数年,mac os上已经能网银支付(中行.招行.工商.支付宝等均已全面支持mac os了),windows上的经典常用软件:qq.飞信.旺旺.有道词典.有道云笔记.迅雷.PPS影音.AcdSee,甚至微软自家的office全套都有for mac,今天下定决心把mac机上vmware里的windows 7给"打入冷宫",准备把oracle.nexus.jboss.weblogic 这些跟java开发有端的"重量级"大家伙都放到c