Published on: 20 April 2016
Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.
There are 9 vulnerabilities identified in Java affecting multiple sub-components including 2D, Hotspot, Serialization, JMX, Deployment, Security, JAXP and JCE. All of them could be remotely exploited without authentication in which 3 of them could affect server deployment of Java (e.g. through a web service).
For vulnerabilities identified in those Oracle products, they can be remotely exploited through various protocols including ECI (Proprietary EDM Protocol), HTTP, HTTPS, IPMI, JMS, Kerberos, MySQL, OpenSSH, Oracle Net and RPC over a network.
There are multiple attack vectors. For Java, an attacker could entice a user to open a specially crafted web page containing un-trusted Java applet or Java Web Start application with malicious content, or to launch executables using the Java launcher. For other Oracle products, a remote attacker could send specially crafted network packets to the affected system to exploit the vulnerabilities.
Oracle Java SE
Database Server
Fusion Middleware
Enterprise Manager Grid Control
E-Business Suite
Oracle Supply Chain Products Suite
PeopleSoft Products
JD Edwards Products
Siebel CRM
Oracle Communications Applications
Oracle Retail Applications
Oracle Health Sciences Applications
Oracle Financial Services Software
Oracle Sun Systems Products Suite
Oracle Virtualization
Oracle MySQL
Berkeley DB
Depending on the vulnerability exploited, a successful attack could lead to arbitrary code execution, denial of services, gain of escalated privilege, information disclosure, bypass of security restrictions or compromise of a vulnerable system.
Patches for affected systems are available. Users of the affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
For Oracle Java SE products, please refer to the following link:
For other Oracle products, please refer to the section "Patch Availability Table and Risk Matrices" of corresponding security advisory at the vendor’s website:
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
Users may contact their product support vendors for the fixes and assistance.
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/java/javase/8u91-relnotes-2949462.html
http://www.oracle.com/technetwork/java/javase/8u92-relnotes-2949471.html
https://www.hkcert.org/my_url/en/alert/16042001
https://www.us-cert.gov/ncas/current-activity/2016/04/19/Oracle-Releases-Security-Bulletin
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4786
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3576
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194 (to CVE-2015-3195)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3253
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0407 (to CVE-2016-0408)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0468 (to CVE-2016-0469)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0479
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0623
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0638 (to CVE-2016-0644)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646 (to CVE-2016-0659)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0661 (to CVE-2016-0663)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0665 (to CVE-2016-0669)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0671 (to CVE-2016-0700)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3416 (to CVE-2016-3423)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425 (to CVE-2016-3429)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3431
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3434 (to CVE-2016-3439)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3441 (to CVE-2016-3443)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3447
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3449
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3454 (to CVE-2016-3457)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3460 (to CVE-2016-3466)