Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Oracle’s October 2019 Critical Patch Update Includes 219 Fixes

Oracle this week announced the release of its last Critical Patch Update of 2019, which includes a total of 219 new security fixes across various product families.

Oracle this week announced the release of its last Critical Patch Update of 2019, which includes a total of 219 new security fixes across various product families.

More than 140 of the vulnerabilities addressed this month can be exploited remotely without authentication. Nineteen of the patches were issued for vulnerabilities that are considered Critical severity, featuring a CVSS score above 9.0.

This month, Fusion Middleware has seen the largest number of security patches, at 37. According to Oracle’s advisory, 31 of the fixed security issues are remotely exploitable without authentication.

MySQL saw the release of 34 security patches, with 9 flaws remotely exploitable without authentication, while Java SE received 20 patches, all of the addressed vulnerabilities being remotely exploitable by unauthenticated attackers.

Other products to have received numerous security patches include Construction and Engineering (13 patches – 11 vulnerabilities remotely exploitable without authentication), PeopleSoft (13 – 10), Retail Applications (12 – 9), Systems Risk (12 – 7), Database Server (10 – 2), Virtualization (11 – 0), E-Business Suite (10 – 10), Enterprise Manager (7– 5), Financial Services Applications (7 – 4), and Food and Beverage Applications (7 – 3).

Security fixes were also released for Policy Automation (4 patches – 4 security bugs remotely exploitable without authentication), Siebel CRM (4 – 4), Supply Chain (3 – 3), GraalVM (3 – 2), Hospitality Applications (3 – 2), Hyperion (3 – 0), Health Sciences Applications (2 – 2), Support Tools (2 – 2), JD Edwards (1 – 1), and NoSQL Database (1 – 1).

Many of the patches released this month address additional vulnerabilities in the affected products, Oracle has revealed.

“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible,” the company notes.

Customers that have skipped one or more Critical Patch Updates are advised to review previously released advisories to determine if they are vulnerable.

They should also apply the appropriate security fixes as soon as possible, given that threat actors have been known to target Oracle products.

Oracle’s Critical Patch Updates are released every three months. The next one will be published on January 14, 2020.

Related: Oracle Launches New Services to Secure the Cloud

Related: Oracle’s July 2019 CPU Includes 319 Fixes

Related: Oracle Releases 297 Fixes in April 2019 Critical Patch Update

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Vulnerabilities

Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.