The Inquirer, a British web site that is ground zero for computer industry gossip - Austin American Statesman
ENTERPRISE VENDOR Oracle has issued its critical patch update advisory for July, plugging a total of 89 security holes across its product portfolio.
The fixes focus mainly on remotely exploitable vulnerabilities in four widely used products, with 27 fixes issued for the Oracle Database, Fusion Middleware, the Oracle and Sun Systems Product Suite and the MySQL database.
Out of the 89 security fixes included with this update, the firm said six are for Oracle Database, with one of the vulnerabilities being remotely exploitable without authentication.
Oracle revealed that the highest CVSS Base Score for these database vulnerabilities is 9.0, a score related to vulnerability CVE-2013-3751, which affects the XML Parser on Oracle Database 220.127.116.11 and 18.104.22.168.
A further 21 patched vulnerabilities listed in Oracle's Critical Patch Update are for Oracle Fusion Middleware; 16 of these vulnerabilities are remotely exploitable without authentication, with the highest CVSS Base Score being 7.5.
As for the Oracle and Sun Systems Products Suite, these products received a total of 16 security fixes, eight of which were also remotely exploitable without authentication, with a maximum CVSS Base Score of 7.8.
"As usual, Oracle recommends that customers apply this Critical Patch Update as soon as possible," Oracle's director of Oracle Software Security Assurance Eric Maurice wrote in a blog post.
Craig Young, a security researcher at Tripwire commented on the Oracle patch, saying the "drumbeat of critical patches" is more than alarming because the vulnerabilities are frequently reported by third parties who presumably do not have access to full source code.
"It's also noteworthy that [...] every Oracle CPU release this year has plugged dozens of vulnerabilities," he added. "By my count, Oracle has already acknowledged and fixed 343 security issues in 2013. In case there was any doubt, this should be a big red flag to end users that Oracle's security practices are simply not working." µ
Sign up for INQbot – a weekly roundup of the best from the INQ