-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2010.0026.3
                Oracle Updates for Multiple Vulnerabilities
                              14 January 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Oracle Database 11g, version 11.1.0.7
                   Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4
                   Oracle Database 10g, version 10.1.0.5
                   Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV
                   Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0, 10.1.3.5, 10.1.3.5.1
                   Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0
                   Oracle Access Manager versions 7.0.4.3, 10.1.4.2
                   Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.5, 12.0.6, 12.1.1 and 12.1.2
                   Oracle E-Business Suite Release 11i, version 11.5.10.2
                   PeopleSoft Enterprise HCM (TAM), versions 8.9 and 9.0
                   Oracle WebLogic Server 10.0 through MP2, 10.3.0 and 10.3.1
                   Oracle WebLogic Server 9.0 GA, 9.1 GA and 9.2 through 9.2 MP3
                   Oracle WebLogic Server 8.1 through 8.1 SP6
                   Oracle WebLogic Server 7.0 through 7.0 SP7
                   Oracle JRockit R27.6.5 and earlier (JDK/JRE 6, 5, 1.4.2)
                   Primavera P6 Enterprise Project Portfolio Management 6.1, 6.2.1 and 7.0
                   Primavera P6 Web Services 6.2.1, 7.0 and 7.0SP1
Publisher:         US-CERT
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-0080 CVE-2010-0079 CVE-2010-0078
                   CVE-2010-0077 CVE-2010-0076 CVE-2010-0075
                   CVE-2010-0074 CVE-2010-0072 CVE-2010-0071
                   CVE-2010-0070 CVE-2010-0069 CVE-2010-0068
                   CVE-2010-0067 CVE-2010-0066 CVE-2009-3416
                   CVE-2009-3415 CVE-2009-3414 CVE-2009-3413
                   CVE-2009-3412 CVE-2009-3411 CVE-2009-3410
                   CVE-2009-1996  

Original Bulletin: 
   http://www.us-cert.gov/cas/techalerts/TA10-012A.html

Revision History:  January 14 2010: Updated Title
                   January 14 2010: Updated CVE Information
                   January 13 2010: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                    National Cyber Alert System

              Technical Cyber Security Alert TA10-012A


Oracle Updates for Multiple Vulnerabilities

   Original release date:
   Last revised: --
   Source: US-CERT


Systems Affected

     * Oracle Database 11g, version 11.1.0.7
     * Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4
     * Oracle Database 10g, version 10.1.0.5
     * Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV
     * Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0, 10.1.3.5, 10.1.3.5.1
     * Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0
     * Oracle Access Manager versions 7.0.4.3, 10.1.4.2
     * Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.5, 12.0.6, 12.1.1 and 12.1.2
     * Oracle E-Business Suite Release 11i, version 11.5.10.2
     * PeopleSoft Enterprise HCM (TAM), versions 8.9 and 9.0
     * Oracle WebLogic Server 10.0 through MP2, 10.3.0 and 10.3.1
     * Oracle WebLogic Server 9.0 GA, 9.1 GA and 9.2 through 9.2 MP3
     * Oracle WebLogic Server 8.1 through 8.1 SP6
     * Oracle WebLogic Server 7.0 through 7.0 SP7
     * Oracle JRockit R27.6.5 and earlier (JDK/JRE 6, 5, 1.4.2)
     * Primavera P6 Enterprise Project Portfolio Management 6.1, 6.2.1 and 7.0
     * Primavera P6 Web Services 6.2.1, 7.0 and 7.0SP1


Overview

   Oracle products and components are affected by multiple
   vulnerabilities. The impacts of these vulnerabilities include
   remote execution of arbitrary code, information disclosure, and
   denial of service.


I. Description

   The Oracle Critical Patch Update Advisory - January 2010 addresses
   24 vulnerabilities in various Oracle products and components. The
   document provides information about affected components, access and
   authorization required for successful exploitation, and the impact
   from the vulnerabilities on data confidentiality, integrity, and
   availability.

   Oracle has associated CVE identifiers with the vulnerabilities
   addressed in this Critical Patch Update. If significant additional
   details about vulnerabilities and remediation techniques become
   available, we will update the Vulnerability Notes Database.


II. Impact

   The impact of these vulnerabilities varies depending on the
   product, component, and configuration of the system. Potential
   consequences include the execution of arbitrary code or commands,
   information disclosure, and denial of service. Vulnerable
   components may be available to unauthenticated, remote attackers.
   An attacker who compromises an Oracle database may be able to
   access sensitive information.


III. Solution

   Apply the appropriate patches or upgrade as specified in the Oracle
   Critical Patch Update Advisory - January 2010. Note that this
   document only lists newly corrected issues. Updates to patches for
   previously known issues are not listed.


IV. References

 * Oracle Patch Update Advisory - January 2010 -
   <http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2010.html>

 * Critical Patch Updates and Security Alerts -
   <http://www.oracle.com/technology/deploy/security/alerts.htm>

 * Map of Public Vulnerability to Advisory/Alert -
   <http://www.oracle.com/technology/deploy/security/critical-patch-updates/public_vuln_to_advisory_mapping.html>

 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA10-012A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA10-012A Feedback VU#148385" in
   the subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2010 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________

Revision History

  January 12, 2010: Initial release


- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBS0zxEducaIvSvh1ZAQLpPgf/VVrk5FTcPFRdv3map88eLhgVIDpKdQmk
1yWuAcyx1vOjEgOeDrl/DYMoNXI0jjvZ+V2r3KA9J2jO0V77J1g5vwxz9uScaU7v
A4IW/Vv31T55IQmYrCsF6rtu/yhPIair2uiOFjc5xRqnoTsufhZ8wm8EBjnOElsV
8D+SjICgaOwh76WQGGJQK0kW2XkdSmGbu8a/Wwm4WvvZ1ngYeURCW32ZCiqdb+tu
gCaqHCELGBCfwx0CUaWsNIwqIWBkD61JN18rnM8XNkVQ61gkbvBMlMGM/WP5CaGh
epIa3qZafEbzd6iogajxUSxy37iFokKZl/2+5o8DE21QdEAE6iI8qA==
=TaF2
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLTrXhNVH5XJJInbgRAoYCAJ4/b1g2hkKpg3SNydNyW801fUz4pQCfa0TI
nJxJbplfd3Kp1rDxW+5cJDk=
=h8r4
-----END PGP SIGNATURE-----