-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0177
           Security Advisory: Oracle Supply Chain Products Suite
                               18 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Oracle Supply Chain Products Suite
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                      Denial of Service               -- Remote with User Interaction
                      Access Confidential Data        -- Existing Account            
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-3069 CVE-2018-0739 CVE-2017-5662
                      CVE-2017-5645 CVE-2016-6814 CVE-2016-1181
Member content until: Friday, August 17 2018
Reference:            ASB-2018.0174
                      ASB-2018.0173
                      ASB-2018.0172
                      ASB-2018.0171

OVERVIEW

        Multiple vulnerabilities have been identified in 
         Agile Recipe Management for Pharmaceuticals, version
          9.3.4
         Oracle Agile Engineering Data Management, versions  6.1.3,
          6.2.0,  6.2.1
         Oracle Agile PLM, versions  9.3.3,  9.3.4,  9.3.5,  9.3.6
         Oracle Agile PLM MCAD Connector, versions  3.3,  3.4,
          3.5,  3.6
         Oracle Agile Product Lifecycle Management for Process,
          version  6.2.0.0
         Oracle AutoVue VueLink Integration, versions  21.0.0,
          21.0.1
         Oracle Transportation Management, versions  6.2,  6.3.7,
          6.4.1
        [1]


IMPACT

        The vendor has provided the following information regarding
        the vulnerabilities:
        
        "This Critical Patch Update contains 8 new security fixes
        for the Oracle Supply Chain Products Suite.   6 of these
        vulnerabilities may be remotely exploitable without
        authentication,  i.e.,  may be exploited over a network
        without requiring user credentials." [1]
        
        
        
        "CVE-2017-5645
        
        9.8
        
        AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        
        Supported versions that are affected are 12.1.0.5 and
        13.2.x. Easily exploitable vulnerability allows
        unauthenticated attacker with network access via HTTP to
        compromise Enterprise Manager Base Platform.  Successful
        attacks of this vulnerability can result in takeover of
        Enterprise Manager Base Platform.
        
        CVE-2016-6814
        
        9.6
        
        AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
        
        Supported versions that are affected are 12.0.x,  13.0.x,
        13.1.x,  13.2.x,  14.0.x,  14.1.x,  15.0.x and   16.0.x.
        Easily exploitable vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise Oracle
        Retail Integration Bus.  Successful attacks require human
        interaction from a person other than the attacker and while
        the vulnerability is in Oracle Retail Integration Bus,
        attacks may significantly impact additional products.
        Successful attacks of this vulnerability can result in
        takeover of Oracle Retail Integration Bus.
        
        CVE-2016-1181
        
        8.1
        
        AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
        
        The supported version that is affected is 12.1.0.5.
        Difficult to exploit vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise
        Enterprise Manager for Fusion Middleware.  Successful
        attacks of this vulnerability can result in takeover of
        Enterprise Manager for Fusion Middleware.
        
        CVE-2016-1181
        
        8.1
        
        AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
        
        The supported version that is affected is 12.1.0.5.
        Difficult to exploit vulnerability allows unauthenticated
        attacker with network access via HTTP to compromise
        Enterprise Manager for Fusion Middleware.  Successful
        attacks of this vulnerability can result in takeover of
        Enterprise Manager for Fusion Middleware.
        
        CVE-2017-5662
        
        7.3
        
        AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
        
        Supported versions that are affected are 7.x and  8.x.
        Easily exploitable vulnerability allows low privileged
        attacker with network access via HTTP to compromise Oracle
        Communications Diameter Signaling Router (DSR).  Successful
        attacks require human interaction from a person other than
        the attacker. Successful attacks of this vulnerability can
        result in  unauthorized access to critical data or complete
        access to all Oracle Communications Diameter Signaling
        Router (DSR) accessible data and unauthorized ability to
        cause a hang or frequently repeatable crash (complete DOS)
        of Oracle Communications Diameter Signaling Router (DSR).
        
        CVE-2018-0739
        
        6.5
        
        AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
        
        Supported versions that are affected are 4.4.1.5.0,
        5.0.0.1.0, 5.0.0.2.0, 5.0.1.0.0 and  5.0.2.0.0. Easily
        exploitable vulnerability allows unauthenticated attacker
        with network access via TLS to compromise Oracle
        Communications Network Charging and Control.  Successful
        attacks require human interaction from a person other than
        the attacker. Successful attacks of this vulnerability can
        result in unauthorized ability to cause a hang or frequently
        repeatable crash (complete DOS) of Oracle Communications
        Network Charging and Control.
        
        CVE-2018-0739
        
        6.5
        
        AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
        
        Supported versions that are affected are 4.4.1.5.0,
        5.0.0.1.0, 5.0.0.2.0, 5.0.1.0.0 and  5.0.2.0.0. Easily
        exploitable vulnerability allows unauthenticated attacker
        with network access via TLS to compromise Oracle
        Communications Network Charging and Control.  Successful
        attacks require human interaction from a person other than
        the attacker. Successful attacks of this vulnerability can
        result in unauthorized ability to cause a hang or frequently
        repeatable crash (complete DOS) of Oracle Communications
        Network Charging and Control.
        
        CVE-2018-3069
        
        2.7
        
        AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
        
        The supported version that is affected is 6.2.0.0. Easily
        exploitable vulnerability allows high privileged attacker
        with network access via HTTP to compromise Oracle Agile
        Product Lifecycle Management for Process.  Successful
        attacks of this vulnerability can result in  unauthorized
        read access to a subset of Oracle Agile Product Lifecycle
        Management for Process accessible data." [2]


MITIGATION

        Oracle states:
        
        "Due to the threat posed by a successful attack, Oracle
        strongly recommends that customers apply CPU fixes as soon
        as possible. Until you apply the CPU fixes, it may be
        possible to reduce the risk of successful attack by blocking
        network protocols required by an attack. For attacks that
        require certain privileges or access to certain packages,
        removing the privileges or the ability to access the
        packages from users that do not need the privileges may help
        reduce the risk of successful attack. Both approaches may
        break application functionality, so Oracle strongly
        recommends that customers test changes on non-production
        systems. Neither approach should be considered a long-term
        solution as neither corrects the underlying problem." [1]


REFERENCES

        [1] Oracle Critical Patch Update Advisory - July 2018
            http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

        [2] Text Form of Oracle Critical Patch Update - July 2018 Risk Matrices
            http://www.oracle.com/technetwork/security-advisory/cpujul2018verbose-4258253.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=x9vw
-----END PGP SIGNATURE-----