www.oracle.com Open in urlscan Pro
2a02:26f0:480:d85::a15  Public Scan

Submitted URL: http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Effective URL: https://www.oracle.com/security-alerts/cpuoct2016.html
Submission: On November 27 via api from HU — Scanned from DE

Form analysis 1 forms found in the DOM

Name: u30searchFormGET https://search.oracle.com/results

<form name="u30searchForm" id="u30searchForm" data-contentpaths="/content/Web/Shared/Auto-Suggest Panel Event" method="get" action="https://search.oracle.com/results">
  <div class="u30s1">
    <button id="u30closesearch" aria-label="Close Search" type="button">
      <span>Close Search</span>
      <svg width="9" height="14" viewBox="0 0 9 14" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path d="M8 13L2 7L8 1" stroke="#161513" stroke-width="2"></path>
      </svg>
    </button>
    <span class="u30input">
      <div class="u30inputw1">
        <input id="u30input" name="q" value="" type="text" placeholder="Search" autocomplete="off" aria-autocomplete="both" aria-label="Search Oracle.com" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-controls="u30searchw3">
      </div>
      <input type="hidden" name="size" value="10">
      <input type="hidden" name="page" value="1">
      <input type="hidden" name="tab" value="all">
      <span id="u30searchw3title" class="u30visually-hidden">Search Oracle.com</span>
      <div id="u30searchw3" data-pagestitle="SUGGESTED LINKS" data-autosuggesttitle="SUGGESTED SEARCHES" data-allresultstxt="All results for" data-allsearchpath="https://search.oracle.com/results?q=u30searchterm&amp;size=10&amp;page=1&amp;tab=all"
        role="listbox" aria-labelledby="u30searchw3title" style="margin-left: 0px;">
        <ul id="u30quicklinks" class="autocomplete-items" role="group" aria-labelledby="u30quicklinks-title">
          <li role="presentation" class="u30auto-title" id="u30quicklinks-title">QUICK LINKS</li>
          <li role="option"><a href="/cloud/" data-lbl="quick-links:oci">Oracle Cloud Infrastructure</a>
          </li>
          <li role=" option"><a href="/applications/" data-lbl="quick-links:applications">Oracle Fusion Cloud Applications</a></li>
          <li role="option"><a href="/database/technologies/" data-lbl="quick-links:database">Oracle Database</a></li>
          <li role="option"><a href="/java/technologies/downloads/" data-lbl="quick-links:download-java">Download Java</a>
          </li>
          <li role="option"><a href="/careers/" data-lbl="quick-links:careers">Careers at Oracle</a></li>
        </ul>
      </div>
      <span class="u30submit">
        <input class="u30searchbttn" type="submit" value="Submit Search">
      </span>
      <button id="u30clear" type="reset" aria-label="Clear Search">
        <svg width="20" height="20" viewBox="0 0 20 20" aria-hidden="true" fill="none" xmlns="http://www.w3.org/2000/svg">
          <path d="M7 7L13 13M7 13L13 7M19 10C19 14.9706 14.9706 19 10 19C5.02944 19 1 14.9706 1 10C1 5.02944 5.02944 1 10 1C14.9706 1 19 5.02944 19 10Z" stroke="#161513" stroke-width="2"></path>
        </svg>
      </button>
    </span>
  </div>
</form>

Text Content

 * Skip to content
 * Accessibility Policy

 * Products
   
 * Industries
   
 * Resources
   
 * Customers
   
 * Partners
   
 * Developers
   
 * Company
   

Close Search

Search Oracle.com
 * QUICK LINKS
 * Oracle Cloud Infrastructure
 * Oracle Fusion Cloud Applications
 * Oracle Database
 * Download Java
 * Careers at Oracle


Search
Country
Close

Would you like to visit an Oracle country site closer to you?



Visit Oracle Germany
No thanks, I'll stay here
See this page for a different country/region
View Accounts
Back
Cloud Account Sign in to Cloud Sign Up for Free Cloud Tier
Oracle Account
 * Sign-In
 * Create an Account

 * Help
 * Sign Out

Contact Sales
Menu Menu

 * Security Alerts


ORACLE CRITICAL PATCH UPDATE ADVISORY - OCTOBER 2016




ORACLE CRITICAL PATCH UPDATE ADVISORY - OCTOBER 2016


DESCRIPTION

A Critical Patch Update (CPU) is a collection of patches for multiple security
vulnerabilities. Critical Patch Update patches are usually cumulative, but each
advisory describes only the security fixes added since the previous Critical
Patch Update advisory. Thus, prior Critical Patch Update advisories should be
reviewed for information regarding earlier published security fixes. Please
refer to:

Critical Patch Updates and Security Alerts for information about Oracle Security
Advisories.

Oracle continues to periodically receive reports of attempts to maliciously
exploit vulnerabilities for which Oracle has already released fixes. In some
instances, it has been reported that attackers have been successful because
targeted customers had failed to apply available Oracle patches. Oracle
therefore strongly recommends that customers remain on actively-supported
versions and apply Critical Patch Update fixes without delay.

This Critical Patch Update contains 253 new security fixes across the product
families listed below. Please note that a blog entry summarizing the content of
this Critical Patch Update and other Oracle Software Security Assurance
activities is located at https://blogs.oracle.com/security.

Please note that the vulnerabilities in this Critical Patch Update are scored
using version 3.0 of Common Vulnerability Scoring Standard (CVSS).

This Critical Patch Update advisory is also available in an XML format that
conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More
information about Oracle's use of CVRF is available here.


AFFECTED PRODUCTS AND COMPONENTS

Security vulnerabilities addressed by this Critical Patch Update affect the
products listed in the categories below. The product area of the patches for the
listed versions is shown in the Patch Availability column corresponding to the
specified Affected Products and Versions column. Please click on the link in the
Patch Availability column below to access the documentation for patch
availability information and installation instructions.

For an overview of the Oracle product documentation related to this Critical
Patch Update, please refer to the Oracle Critical Patch Update October 2016
Documentation Map, My Oracle Support Note.

The list of affected product releases and versions that are in Premier Support
or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Affected Products and Versions Patch Availability Application Express,
version(s) prior to 5.0.4.0.7 Database Oracle Database Server, version(s)
11.2.0.4, 12.1.0.2 Database Oracle Secure Backup, version(s) prior to
10.4.0.4.0, prior to 12.1.0.2.0 Oracle Secure Backup Big Data Graph, version(s)
prior to 1.2 Oracle Big Data Graph NetBeans, version(s) 8.1 Fusion Middleware
Oracle BI Publisher, version(s) 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0 Fusion
Middleware Oracle Big Data Discovery, version(s) 1.1.1, 1.1.3, 1.2.0 Fusion
Middleware Oracle Business Intelligence Enterprise Edition, version(s)
11.1.1.7.0, 11.1.1.9.0, 12.1.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Data
Integrator, version(s) 11.1.1.7.0, 11.1.1.9.0, 12.1.2.0.0, 12.1.3.0.0,
12.2.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Discoverer, version(s)
11.1.1.7.0 Fusion Middleware Oracle Fusion Middleware, version(s) 11.1.1.7,
11.1.1.9, 11.1.2.3, 11.1.2.4, 12.1.3.0, 12.2.1.0, 12.2.1.1 Fusion Middleware
Oracle GlassFish Server, version(s) 2.1.1, 3.0.1, 3.1.2 Fusion Middleware Oracle
Identity Manager, version(s) - Fusion Middleware Oracle iPlanet Web Proxy
Server, version(s) 4.0 Fusion Middleware Oracle iPlanet Web Server, version(s)
7.0 Fusion Middleware Oracle Outside In Technology, version(s) 8.4.0, 8.5.1,
8.5.2, 8.5.3 Fusion Middleware Oracle Platform Security for Java, version(s)
12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Web Services,
version(s) 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0 Fusion Middleware
Oracle WebCenter Sites, version(s) 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 Fusion
Middleware Oracle WebLogic Server, version(s) 10.3.6.0, 12.1.3.0, 12.2.1.0,
12.2.1.1 Fusion Middleware Enterprise Manager, version(s) 12.1.4, 12.2.2, 12.3.2
Enterprise Manager Enterprise Manager Base Platform, version(s) 12.1.0.5
Enterprise Manager Oracle Application Testing Suite, version(s) 12.5.0.1,
12.5.0.2, 12.5.0.3 Enterprise Manager Oracle E-Business Suite, version(s)
12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 E-Business Suite Oracle
Advanced Supply Chain Planning, version(s) 12.2.3, 12.2.4, 12.2.5 Oracle Supply
Chain Products Oracle Agile Engineering Data Management, version(s) 6.1.3.0,
6.2.0.0 Oracle Supply Chain Products Oracle Agile PLM, version(s) 9.3.4, 9.3.5
Oracle Supply Chain Products Oracle Agile Product Lifecycle Management for
Process, version(s) 6.1.0.4, 6.1.1.6, 6.2.0.0 Oracle Supply Chain Products
Oracle Transportation Management, version(s) 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2,
6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7 Oracle Supply Chain Products PeopleSoft
Enterprise HCM, version(s) 9.2 PeopleSoft PeopleSoft Enterprise PeopleTools,
version(s) 8.54, 8.55 PeopleSoft PeopleSoft Enterprise SCM Services Procurement,
version(s) 9.1, 9.2 PeopleSoft JD Edwards EnterpriseOne Tools, version(s) 9.1 JD
Edwards JD Edwards World Security, version(s) A9.4 JD Edwards Siebel
Applications, version(s) 7.1, 16.1 Siebel Oracle Commerce Guided Search,
version(s) 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2 Oracle Commerce Oracle
Commerce Guided Search / Oracle Commerce Experience Manager, version(s) 3.1.1,
3.1.2, 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2, 11.0, 11.1, 11.2 Oracle
Commerce Oracle Commerce Platform, version(s) 10.0.3.5, 10.2.0.5, 11.2.0.1
Oracle Commerce Oracle Commerce Service Center, version(s) 10.0.3.5, 10.2.0.5
Oracle Commerce Oracle Fusion Applications, version(s) 11.1.2 through 11.1.9
Fusion Applications Oracle Communications Policy Management, version(s) 9.7.3,
9.9.1, 10.4.1, 12.1.1 and prior Oracle Communications Policy Management Oracle
Enterprise Communications Broker, version(s) Pcz2.0.0m4p5 and earlier Oracle
Enterprise Communications Broker Oracle Enterprise Session Border Controller,
version(s) Ecz7.3m1p4 and earlier Oracle Enterprise Session Border Controller
Oracle Banking Digital Experience, version(s) 15.1 Oracle Financial Services
Applications Oracle Financial Services Analytical Applications Infrastructure,
version(s) 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 8.0.0, 8.0.1, 8.0.2, 8.0.3
Oracle Financial Services Applications Oracle Financial Services Lending and
Leasing, version(s) 14.1.0, 14.2.0 Oracle Financial Services Applications Oracle
FLEXCUBE Core Banking, version(s) 11.5.0.0.0, 11.6.0.0.0 Oracle Financial
Services Applications Oracle FLEXCUBE Enterprise Limits and Collateral
Management, version(s) 12.0.0, 12.1.0 Oracle Financial Services Applications
Oracle FLEXCUBE Investor Servicing, version(s) 12.0.1 Oracle Financial Services
Applications Oracle FLEXCUBE Private Banking, version(s) 2.0.0, 2.0.1, 2.2.0,
12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 Oracle Financial Services Applications
Oracle FLEXCUBE Universal Banking, version(s) 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3, 12.1.0, 12.2.0, 12.87.1, 12.87.2 Oracle Financial Services Applications
Oracle Life Sciences Data Hub, version(s) 2.x Health Sciences Oracle Hospitality
OPERA 5 Property Services, version(s) 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0,
5.5.0.0, 5.5.1.0 Oracle Hospitality OPERA 5 Property Services Oracle Insurance
IStream, version(s) 4.3.2 Oracle Insurance Applications MICROS XBR, version(s)
7.0.2, 7.0.4 MICROS XBR Oracle Retail Back Office, version(s) 13.0, 13.1, 13.2,
13.3, 13.4, 14.0, 14.1 Oracle Retail Back Office Oracle Retail Central Office,
version(s) 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1 Oracle Retail Central Office
Oracle Retail Clearance Optimization Engine, version(s) 13.2, 13.3, 13.4, 14.0
Oracle Retail Clearance Optimization Engine Oracle Retail Customer Insights,
version(s) 15.0 Oracle Retail Customer Insights Oracle Retail Merchandising
Insights, version(s) 15.0 Oracle Retail Merchandising Insights Oracle Retail
Returns Management, version(s) 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1 Oracle
Retail Returns Management Oracle Retail Xstore Payment, version(s) 1.x Oracle
Retail Xstore Payment Oracle Retail Xstore Point of Service, version(s) 5.0,
5.5, 6.0, 6.5, 7.0, 7.1 Oracle Retail Xstore Point of Service Primavera P6
Enterprise Project Portfolio Management, version(s) 8.4, 15.x, 16.x Oracle
Primavera Products Suite Primavera P6 Professional Project Management,
version(s) 8.3, 8.4, 15.x, 16.x Oracle Primavera Products Suite Oracle Java SE,
version(s) 6u121, 7u111, 8u102 Oracle Java SE Oracle Java SE Embedded,
version(s) 8u101 Oracle Java SE Solaris, version(s) 10, 11.3 Oracle and Sun
Systems Products Suite Solaris Cluster, version(s) 3.3, 4.3 Oracle and Sun
Systems Products Suite Sun ZFS Storage Appliance Kit (AK), version(s) AK 2013
Oracle and Sun Systems Products Suite Oracle VM VirtualBox, version(s) prior to
5.0.28, prior to 5.1.8 Oracle Linux and Virtualization Secure Global Desktop,
version(s) 4.7, 5.2 Oracle Linux and Virtualization Sun Ray Operating Software,
version(s) prior to 11.1.7 Oracle Linux and Virtualization Virtual Desktop
Infrastructure, version(s) prior to 3.5.3 Oracle Linux and Virtualization MySQL
Connector, version(s) 2.0.4 and prior, 2.1.3 and prior Oracle MySQL Product
Suite MySQL Server, version(s) 5.5.52 and prior, 5.6.33 and prior, 5.7.15 and
prior Oracle MySQL Product Suite

Affected Products and Versions Patch Availability Application Express,
version(s) prior to 5.0.4.0.7 Database Oracle Database Server, version(s)
11.2.0.4, 12.1.0.2 Database Oracle Secure Backup, version(s) prior to
10.4.0.4.0, prior to 12.1.0.2.0 Oracle Secure Backup Big Data Graph, version(s)
prior to 1.2 Oracle Big Data Graph NetBeans, version(s) 8.1 Fusion Middleware
Oracle BI Publisher, version(s) 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0 Fusion
Middleware Oracle Big Data Discovery, version(s) 1.1.1, 1.1.3, 1.2.0 Fusion
Middleware Oracle Business Intelligence Enterprise Edition, version(s)
11.1.1.7.0, 11.1.1.9.0, 12.1.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Data
Integrator, version(s) 11.1.1.7.0, 11.1.1.9.0, 12.1.2.0.0, 12.1.3.0.0,
12.2.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Discoverer, version(s)
11.1.1.7.0 Fusion Middleware Oracle Fusion Middleware, version(s) 11.1.1.7,
11.1.1.9, 11.1.2.3, 11.1.2.4, 12.1.3.0, 12.2.1.0, 12.2.1.1 Fusion Middleware
Oracle GlassFish Server, version(s) 2.1.1, 3.0.1, 3.1.2 Fusion Middleware Oracle
Identity Manager, version(s) - Fusion Middleware Oracle iPlanet Web Proxy
Server, version(s) 4.0 Fusion Middleware Oracle iPlanet Web Server, version(s)
7.0 Fusion Middleware Oracle Outside In Technology, version(s) 8.4.0, 8.5.1,
8.5.2, 8.5.3 Fusion Middleware Oracle Platform Security for Java, version(s)
12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0 Fusion Middleware Oracle Web Services,
version(s) 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0 Fusion Middleware
Oracle WebCenter Sites, version(s) 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 Fusion
Middleware Oracle WebLogic Server, version(s) 10.3.6.0, 12.1.3.0, 12.2.1.0,
12.2.1.1 Fusion Middleware Enterprise Manager, version(s) 12.1.4, 12.2.2, 12.3.2
Enterprise Manager Enterprise Manager Base Platform, version(s) 12.1.0.5
Enterprise Manager Oracle Application Testing Suite, version(s) 12.5.0.1,
12.5.0.2, 12.5.0.3 Enterprise Manager Oracle E-Business Suite, version(s)
12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 E-Business Suite Oracle
Advanced Supply Chain Planning, version(s) 12.2.3, 12.2.4, 12.2.5 Oracle Supply
Chain Products Oracle Agile Engineering Data Management, version(s) 6.1.3.0,
6.2.0.0 Oracle Supply Chain Products Oracle Agile PLM, version(s) 9.3.4, 9.3.5
Oracle Supply Chain Products Oracle Agile Product Lifecycle Management for
Process, version(s) 6.1.0.4, 6.1.1.6, 6.2.0.0 Oracle Supply Chain Products
Oracle Transportation Management, version(s) 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2,
6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7 Oracle Supply Chain Products PeopleSoft
Enterprise HCM, version(s) 9.2 PeopleSoft PeopleSoft Enterprise PeopleTools,
version(s) 8.54, 8.55 PeopleSoft PeopleSoft Enterprise SCM Services Procurement,
version(s) 9.1, 9.2 PeopleSoft JD Edwards EnterpriseOne Tools, version(s) 9.1 JD
Edwards JD Edwards World Security, version(s) A9.4 JD Edwards Siebel
Applications, version(s) 7.1, 16.1 Siebel Oracle Commerce Guided Search,
version(s) 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2 Oracle Commerce Oracle
Commerce Guided Search / Oracle Commerce Experience Manager, version(s) 3.1.1,
3.1.2, 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2, 11.0, 11.1, 11.2 Oracle
Commerce Oracle Commerce Platform, version(s) 10.0.3.5, 10.2.0.5, 11.2.0.1
Oracle Commerce Oracle Commerce Service Center, version(s) 10.0.3.5, 10.2.0.5
Oracle Commerce Oracle Fusion Applications, version(s) 11.1.2 through 11.1.9
Fusion Applications Oracle Communications Policy Management, version(s) 9.7.3,
9.9.1, 10.4.1, 12.1.1 and prior Oracle Communications Policy Management Oracle
Enterprise Communications Broker, version(s) Pcz2.0.0m4p5 and earlier Oracle
Enterprise Communications Broker Oracle Enterprise Session Border Controller,
version(s) Ecz7.3m1p4 and earlier Oracle Enterprise Session Border Controller
Oracle Banking Digital Experience, version(s) 15.1 Oracle Financial Services
Applications Oracle Financial Services Analytical Applications Infrastructure,
version(s) 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 8.0.0, 8.0.1, 8.0.2, 8.0.3
Oracle Financial Services Applications Oracle Financial Services Lending and
Leasing, version(s) 14.1.0, 14.2.0 Oracle Financial Services Applications Oracle
FLEXCUBE Core Banking, version(s) 11.5.0.0.0, 11.6.0.0.0 Oracle Financial
Services Applications Oracle FLEXCUBE Enterprise Limits and Collateral
Management, version(s) 12.0.0, 12.1.0 Oracle Financial Services Applications
Oracle FLEXCUBE Investor Servicing, version(s) 12.0.1 Oracle Financial Services
Applications Oracle FLEXCUBE Private Banking, version(s) 2.0.0, 2.0.1, 2.2.0,
12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 Oracle Financial Services Applications
Oracle FLEXCUBE Universal Banking, version(s) 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3, 12.1.0, 12.2.0, 12.87.1, 12.87.2 Oracle Financial Services Applications
Oracle Life Sciences Data Hub, version(s) 2.x Health Sciences Oracle Hospitality
OPERA 5 Property Services, version(s) 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0,
5.5.0.0, 5.5.1.0 Oracle Hospitality OPERA 5 Property Services Oracle Insurance
IStream, version(s) 4.3.2 Oracle Insurance Applications MICROS XBR, version(s)
7.0.2, 7.0.4 MICROS XBR Oracle Retail Back Office, version(s) 13.0, 13.1, 13.2,
13.3, 13.4, 14.0, 14.1 Oracle Retail Back Office Oracle Retail Central Office,
version(s) 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1 Oracle Retail Central Office
Oracle Retail Clearance Optimization Engine, version(s) 13.2, 13.3, 13.4, 14.0
Oracle Retail Clearance Optimization Engine Oracle Retail Customer Insights,
version(s) 15.0 Oracle Retail Customer Insights Oracle Retail Merchandising
Insights, version(s) 15.0 Oracle Retail Merchandising Insights Oracle Retail
Returns Management, version(s) 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1 Oracle
Retail Returns Management Oracle Retail Xstore Payment, version(s) 1.x Oracle
Retail Xstore Payment Oracle Retail Xstore Point of Service, version(s) 5.0,
5.5, 6.0, 6.5, 7.0, 7.1 Oracle Retail Xstore Point of Service Primavera P6
Enterprise Project Portfolio Management, version(s) 8.4, 15.x, 16.x Oracle
Primavera Products Suite Primavera P6 Professional Project Management,
version(s) 8.3, 8.4, 15.x, 16.x Oracle Primavera Products Suite Oracle Java SE,
version(s) 6u121, 7u111, 8u102 Oracle Java SE Oracle Java SE Embedded,
version(s) 8u101 Oracle Java SE Solaris, version(s) 10, 11.3 Oracle and Sun
Systems Products Suite Solaris Cluster, version(s) 3.3, 4.3 Oracle and Sun
Systems Products Suite Sun ZFS Storage Appliance Kit (AK), version(s) AK 2013
Oracle and Sun Systems Products Suite Oracle VM VirtualBox, version(s) prior to
5.0.28, prior to 5.1.8 Oracle Linux and Virtualization Secure Global Desktop,
version(s) 4.7, 5.2 Oracle Linux and Virtualization Sun Ray Operating Software,
version(s) prior to 11.1.7 Oracle Linux and Virtualization Virtual Desktop
Infrastructure, version(s) prior to 3.5.3 Oracle Linux and Virtualization MySQL
Connector, version(s) 2.0.4 and prior, 2.1.3 and prior Oracle MySQL Product
Suite MySQL Server, version(s) 5.5.52 and prior, 5.6.33 and prior, 5.7.15 and
prior Oracle MySQL Product Suite

NOTE:

 * Vulnerabilities affecting Oracle Database and Oracle Fusion Middleware may
   affect Oracle Fusion Applications, so Oracle customers should refer to Oracle
   Fusion Applications Critical Patch Update Knowledge Document, My Oracle
   Support Note 1967316.1 for information on patches to be applied to Fusion
   Application environments.
 * Users running Java SE with a browser can download the latest release from
   http://java.com. Users on the Windows and Mac OS X platforms can also use
   automatic updates to get the latest release.
 * Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle
   customers should refer to the Oracle and Sun Systems Product Suite Critical
   Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for
   information on minimum revisions of security fixes required to resolve ZFSSA
   issues published in Critical Patch Updates (CPUs) and Solaris Third Party
   bulletins.
 * Users can download the latest release of Netbeans from http://netbeans.org.
   Users running earlier versions of Netbeans can use automatic updates to get
   the latest patches.


RISK MATRIX CONTENT

Risk matrices list only security vulnerabilities that are newly fixed by the
patches associated with this advisory. Risk matrices for previous security fixes
can be found in previous Critical Patch Update advisories. An English text
version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple
products. Each vulnerability is identified by a CVE# which is a unique
identifier for a vulnerability. A vulnerability that affects multiple products
will appear with the same CVE# in all risk matrices. A CVE# shown in italics
indicates that this vulnerability impacts a different product, but also has
impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.0 (see Oracle CVSS
Scoring for an explanation of how Oracle applies CVSS version 3.0).

Oracle conducts an analysis of each security vulnerability addressed by a
Critical Patch Update (CPU). Oracle does not disclose information about the
security analysis, but the resulting Risk Matrix and associated documentation
provide information about the type of vulnerability, the conditions required to
exploit it, and the potential impact of a successful exploit. Oracle provides
this information, in part, so that customers may conduct their own risk analysis
based on the particulars of their product usage. For more information, see
Oracle vulnerability disclosure policies.

The protocol in the risk matrix implies that all of its secure variants (if
applicable) are affected as well. For example, if HTTP is listed as an affected
protocol, it implies that HTTPS (if applicable) is also affected. The secure
variant of a protocol is listed in the risk matrix only if it is the only
variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL
and TLS.


WORKAROUNDS

Due to the threat posed by a successful attack, Oracle strongly recommends that
customers apply CPU fixes as soon as possible. Until you apply the CPU fixes, it
may be possible to reduce the risk of successful attack by blocking network
protocols required by an attack. For attacks that require certain privileges or
access to certain packages, removing the privileges or the ability to access the
packages from users that do not need the privileges may help reduce the risk of
successful attack. Both approaches may break application functionality, so
Oracle strongly recommends that customers test changes on non-production
systems. Neither approach should be considered a long-term solution as neither
corrects the underlying problem.


SKIPPED CRITICAL PATCH UPDATES

Oracle strongly recommends that customers apply security fixes as soon as
possible. For customers that have skipped one or more Critical Patch Updates and
are concerned about products that do not have security fixes announced in this
CPU, please review previous Critical Patch Update advisories to determine
appropriate actions.


PRODUCT DEPENDENCIES

Oracle products may have dependencies on other Oracle products. Hence security
vulnerability fixes announced in this Critical Patch Update may affect one or
more dependent Oracle products. For details regarding these dependencies and how
to apply patches to dependent products, please refer to Patch Set Update and
Critical Patch Update October 2016 Availability Document, My Oracle Support Note
2171485.1.


CRITICAL PATCH UPDATE SUPPORTED PRODUCTS AND VERSIONS

Patches released through the Critical Patch Update program are provided only for
product versions that are covered under the Premier Support or Extended Support
phases of the Lifetime Support Policy. We recommend that customers plan product
upgrades to ensure that patches released through the Critical Patch Update
program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not
tested for the presence of vulnerabilities addressed by this Critical Patch
Update. However, it is likely that earlier versions of affected releases are
also affected by these vulnerabilities. As a result, Oracle recommends that
customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform
(formerly "Oracle Enterprise Manager Grid Control") and Collaboration Suite
products are patched in accordance with the Software Error Correction Support
Policy explained in My Oracle Support Note 209768.1. Please review the Technical
Support Policies for further guidelines regarding support policies and phases of
support.


PRODUCTS IN EXTENDED SUPPORT

Patches released through the Critical Patch Update program are available to
customers who have Extended Support under the Lifetime Support Policy. Customers
must have a valid Extended Support service contract to download patches released
through the Critical Patch Update program for products in the Extended Support
Phase.


CREDIT STATEMENT

The following people or organizations reported security vulnerabilities
addressed by this Critical Patch Update to Oracle: Abhishek Singh; Alejo
Popovici; Alexander Kornbrust of Red Database Security; Amichai Shulman of
Imperva, Inc.; Ariel Walter Garcia; Behzad Najjarpour Jabbari, Secunia Research
at Flexera Software; bo13oy of Trend Micro's Zero Day Initiative; Cezar Santos;
David Litchfield of Google; Dawid Golunski; Denis Shpektorov; Devin Rosenbauer
of Identity Works LLC; Emiliano J. Fausto of Onapsis; Felix Wilhelm; Hunter Liu
of Huawei's IT Infrastructure & Security Dept, BPIT&QM; Jackson Thuraisamy of
Security Compass; Jacob Baines - Tenable Network Security working with Trend
Micro's Zero Day Initiative; Jakub Palaczynski of ING Services Polska; John Page
(hyp3rlinx); Jordan Milne; Mateusz Guzik; Matias Mevied of Onapsis; Matthias
Kaiser of Code White; Michael Miller of Integrigy; Okan Basegmez of DORASEC
Consulting; Pete Finnigan; Peter Moody; Rahmat Nur Fauzi; Reno Robert; Rex Dale
Stevens; Sahar Sabban of Intel; Suraj Khetani of Gulf Business Machines; Sven
Blumenstein of Google; Tommy DeVoss of Evolution Security; Valentin Dornauer;
and Vishnu Padmakumar.

SECURITY-IN-DEPTH CONTRIBUTORS

Oracle acknowledges people who have contributed to our Security-In-Depth program
(see FAQ). People are acknowledged for Security-In-Depth contributions if they
provide information, observations or suggestions pertaining to security
vulnerability issues that result in significant modification of Oracle code or
documentation in future releases, but are not of such a critical nature that
they are distributed in Critical Patch Updates.

In this Critical Patch Update Advisory, Oracle recognizes Adam Willard of
Raytheon Foreground Security; Christopher Lamberson; Masato Kinugawa; Max Pilar
of Blue Canopy; Michael Rasmussen of Zeroturnaround; Recx Ltd; Shanliang Jiang;
Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.; and
Talib Osmani for contributions to Oracle's Security-In-Depth program.

ON-LINE PRESENCE SECURITY CONTRIBUTORS

Oracle provides acknowledges people who have contributed to our On-Line Presence
Security program (see FAQ). People are acknowledged for contributions relating
to Oracle's on-line presence if they provide information, observations or
suggestions pertaining to security-related issues that result in significant
modification to Oracle's on-line external-facing systems.

For this quarter, Oracle recognizes Adam Willard of Raytheon Foreground
Security; Adam Willard, reported through CMS; Ahmad Amjad Alfoqha'a; Amine HM;
Arbin Godar; Ayoub Ait Elmokhtar; Ben Khilfa Fahmi - SIFARIS Tunisia; Cameron
Dawe of Spam404.com; Dhiraj Mishra of TMT ITRA Cyber Security Team at EY;
Filippos Mastrogiannis of Hellenic Telecommunications Organization S.A (OTE);
Hamza Bachikh; Jatinpreet Singh; Jayvardhan Singh; Jiri Stary; Kamran Saifullah
(ImpactX Technologies); Ketankumar B. Godhani of Ketankumar Godhani; Mandeep
Jadon; Mudit Punia of Torrid Networks Pvt. Ltd; Muhammad Zeeshan; Nikhil Mittal;
Pradeep Kumar; Pravin Nagare; Ravindra Singh Rathore; Shahmeer Baloch; Shawar
Khan; Sree Visakh Jain; and wh0ami for contributions to Oracle's On-Line
Presence Security program.


CRITICAL PATCH UPDATE SCHEDULE

Critical Patch Updates are released on the Tuesday closest to the 17th day of
January, April, July and October. The next four dates are:

 * 17 January 2017
 * 18 April 2017
 * 18 July 2017
 * 17 October 2017


REFERENCES

 * Oracle Critical Patch Updates and Security Alerts main page [ Oracle
   Technology Network ]
 * Critical Patch Update - October 2016 Documentation Map [ My Oracle Support
   Note ]
 * Oracle Critical Patch Updates and Security Alerts - Frequently Asked
   Questions [ CPU FAQ ]
 * Risk Matrix definitions [ Risk Matrix Definitions ]
 * Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS
   Scoring ]
 * English text version of the risk matrices [ Oracle Technology Network ]
 * CVRF XML version of the risk matrices [ Oracle Technology Network ]
 * The Oracle Software Security Assurance Blog [ The Oracle Software Security
   Assurance Blog ]
 * List of public vulnerabilities fixed in Critical Patch Updates and Security
   Alerts [ Oracle Technology Network ]
 * Software Error Correction Support Policy [ My Oracle Support Note 209768.1 ]


MODIFICATION HISTORY

Date Note 2019-May-16 Rev 5. Added note to Fusion Middleware risk matrix
indicating that the fix of CVE-2016-5535 also addresses CVE-2016-1000031.
2016-November-21 Rev 4. Vulnerable component for CVE-2016-1181 changed to Portal
SEC. Added note to MySQL risk matrix concerning equivalent CVEs. 2016-October-24
Rev 3. Version updated to Ecz7.3m1p4, sub-component changed for CVE-2013-2566,
CVE-2014-2532. 2016-October-19 Rev 2. CVSS score updated for CVE-2016-5610.
2016-October-18 Rev 1. Initial Release.

Date Note 2019-May-16 Rev 5. Added note to Fusion Middleware risk matrix
indicating that the fix of CVE-2016-5535 also addresses CVE-2016-1000031.
2016-November-21 Rev 4. Vulnerable component for CVE-2016-1181 changed to Portal
SEC. Added note to MySQL risk matrix concerning equivalent CVEs. 2016-October-24
Rev 3. Version updated to Ecz7.3m1p4, sub-component changed for CVE-2013-2566,
CVE-2014-2532. 2016-October-19 Rev 2. CVSS score updated for CVE-2016-5610.
2016-October-18 Rev 1. Initial Release.


APPENDIX - ORACLE DATABASE SERVER

ORACLE DATABASE SERVER EXECUTIVE SUMMARY

This Critical Patch Update contains 12 new security fixes for the Oracle
Database Server divided as follows:

 * 9 new security fixes for the Oracle Database Server. 1 of these
   vulnerabilities may be remotely exploitable without authentication, i.e., may
   be exploited over a network without requiring user credentials. 1 of these
   fixes is applicable to client-only installations, i.e., installations that do
   not have the Oracle Database Server installed. The English text form of this
   Risk Matrix can be found here.
 * 2 new security fixes for Oracle Secure Backup. Both of these vulnerabilities
   may be remotely exploitable without authentication, i.e., may be exploited
   over a network without requiring user credentials. The English text form of
   this Risk Matrix can be found here.
 * 1 new security fix for Oracle Big Data Graph. This vulnerability is not
   remotely exploitable without authentication, i.e., may not be exploited over
   a network without requiring user credentials. The English text form of this
   Risk Matrix can be found here.

ORACLE DATABASE SERVER RISK MATRIX

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without
Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions
Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact
Scope Confid­entiality Inte­grity Avail­ability CVE-2016-5555 OJVM Create
Session, Create Procedure Multiple No 9.1 Network Low High None Changed High
High High 11.2.0.4, 12.1.0.2   CVE-2016-5572 Kernel PDB Create Session Oracle
Net No 6.4 Local High High None Un- changed High High High 12.1.0.2  
CVE-2016-5497 RDBMS Security Create Session Oracle Net No 6.4 Local High High
None Un- changed High High High 12.1.0.2   CVE-2010-5312 Application Express
None HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to
5.0.4.00.07   CVE-2016-5516 Kernel PDB Execute on DBMS_PDB_EXEC_SQL Oracle Net
No 6.0 Local Low High None Changed None None High 12.1.0.2   CVE-2016-5505 RDBMS
Programmable Interface Create Session Oracle Net No 5.5 Local Low Low None Un-
changed High None None 11.2.0.4, 12.1.0.2   CVE-2016-5498 RDBMS Security Create
Session Oracle Net No 3.3 Local Low Low None Un- changed Low None None 11.2.0.4,
12.1.0.2   CVE-2016-5499 RDBMS Security Create Session Oracle Net No 3.3 Local
Low Low None Un- changed Low None None 11.2.0.4, 12.1.0.2   CVE-2016-3562 RDBMS
Security and SQL*Plus DBA level privileged account Oracle Net No 2.4 Network Low
High Required Un- changed Low None None 11.2.0.4, 12.1.0.2 See Note 1

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without
Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions
Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact
Scope Confid­entiality Inte­grity Avail­ability CVE-2016-5555 OJVM Create
Session, Create Procedure Multiple No 9.1 Network Low High None Changed High
High High 11.2.0.4, 12.1.0.2   CVE-2016-5572 Kernel PDB Create Session Oracle
Net No 6.4 Local High High None Un- changed High High High 12.1.0.2  
CVE-2016-5497 RDBMS Security Create Session Oracle Net No 6.4 Local High High
None Un- changed High High High 12.1.0.2   CVE-2010-5312 Application Express
None HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to
5.0.4.00.07   CVE-2016-5516 Kernel PDB Execute on DBMS_PDB_EXEC_SQL Oracle Net
No 6.0 Local Low High None Changed None None High 12.1.0.2   CVE-2016-5505 RDBMS
Programmable Interface Create Session Oracle Net No 5.5 Local Low Low None Un-
changed High None None 11.2.0.4, 12.1.0.2   CVE-2016-5498 RDBMS Security Create
Session Oracle Net No 3.3 Local Low Low None Un- changed Low None None 11.2.0.4,
12.1.0.2   CVE-2016-5499 RDBMS Security Create Session Oracle Net No 3.3 Local
Low Low None Un- changed Low None None 11.2.0.4, 12.1.0.2   CVE-2016-3562 RDBMS
Security and SQL*Plus DBA level privileged account Oracle Net No 2.4 Network Low
High Required Un- changed Low None None 11.2.0.4, 12.1.0.2 See Note 1

NOTES:

 1. Fix applicable to both server and client side installations.

ORACLE DATABASE SERVER CLIENT-ONLY INSTALLATIONS

The following Oracle Database Server vulnerability included in this Critical
Patch Update affects client-only installations: CVE-2016-3562. .

ORACLE SECURE BACKUP EXECUTIVE SUMMARY

This Critical Patch Update contains 2 new security fixes for Oracle Secure
Backup. Both of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE SECURE BACKUP RISK MATRIX

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without
Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions
Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact
Scope Confid­entiality Inte­grity Avail­ability CVE-2015-1351 Oracle Secure
Backup None Multiple Yes 5.8 Network Low None None Changed None None Low Prior
to 12.1.0.2.0   CVE-2015-0286 Oracle Secure Backup None SSL Yes 5.8 Network Low
None None Changed None None Low Prior to 10.4.0.4.0  

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without
Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions
Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact
Scope Confid­entiality Inte­grity Avail­ability CVE-2015-1351 Oracle Secure
Backup None Multiple Yes 5.8 Network Low None None Changed None None Low Prior
to 12.1.0.2.0   CVE-2015-0286 Oracle Secure Backup None SSL Yes 5.8 Network Low
None None Changed None None Low Prior to 10.4.0.4.0  

ORACLE BIG DATA GRAPH EXECUTIVE SUMMARY

This Critical Patch Update contains 1 new security fix for Oracle Big Data
Graph. This vulnerability is not remotely exploitable without authentication,
i.e., may not be exploited over a network without requiring user credentials.
The English text form of this Risk Matrix can be found here.

ORACLE BIG DATA GRAPH RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Big Data Graph Apache
Commons Collections HTTP No 8.8 Network Low Low None Un- changed High High High
Prior to 1.2  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Big Data Graph Apache
Commons Collections HTTP No 8.8 Network Low Low None Un- changed High High High
Prior to 1.2  


APPENDIX - ORACLE FUSION MIDDLEWARE

ORACLE FUSION MIDDLEWARE EXECUTIVE SUMMARY

This Critical Patch Update contains 29 new security fixes for Oracle Fusion
Middleware. 19 of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are
affected by the vulnerabilities listed in the Oracle Database section. The
exposure of Oracle Fusion Middleware products is dependent on the Oracle
Database version being used. Oracle Database security fixes are not listed in
the Oracle Fusion Middleware risk matrix. However, since vulnerabilities
affecting Oracle Database versions may affect Oracle Fusion Middleware products,
Oracle recommends that customers apply the October 2016 Critical Patch Update to
the Oracle Database components of Oracle Fusion Middleware products. For
information on what patches need to be applied to your environments, refer to
Critical Patch Update October 2016 Patch Availability Document for Oracle
Products, My Oracle Support Note 2171485.1.

ORACLE FUSION MIDDLEWARE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Big Data
Discovery Data Processing HTTP Yes 9.8 Network Low None None Un- changed High
High High 1.1.1, 1.1.3, 1.2.0   CVE-2016-3551 Oracle Web Services JAXWS Web
Services Stack HTTP Yes 9.8 Network Low None None Un- changed High High High
11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0   CVE-2015-7501 Oracle WebLogic
Server None HTTP Yes 9.8 Network Low None None Un- changed High High High
10.3.6.0, 12.1.3.0, 12.2.1.0   CVE-2016-5535 Oracle WebLogic Server None HTTP
Yes 9.8 Network Low None None Un- changed High High High 10.3.6.0, 12.1.3.0,
12.2.1.0, 12.2.1.1   CVE-2016-5531 Oracle WebLogic Server WLS-WebServices HTTP
Yes 9.8 Network Low None None Un- changed High High High 10.3.6.0, 12.1.3.0,
12.2.1.0   CVE-2016-1950 Oracle GlassFish Server Security HTTPS Yes 8.8 Network
Low None Required Un- changed High High High 2.1.1   CVE-2016-5519 Oracle
GlassFish Server Java Server Faces Multiple No 8.8 Network Low Low None Un-
changed High High High 2.1.1, 3.0.1, 3.1.2   CVE-2016-3505 Oracle WebLogic
Server JavaServer Faces HTTP No 8.8 Network Low Low None Un- changed High High
High 10.3.6.0, 12.1.3.0, 12.2.1.0   CVE-2016-1950 Oracle iPlanet Web Proxy
Server Security HTTPS Yes 8.8 Network Low None Required Un- changed High High
High 4.0   CVE-2016-1950 Oracle iPlanet Web Server Security HTTPS Yes 8.8
Network Low None Required Un- changed High High High 7.0   CVE-2016-5558 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5574 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5577 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5578 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5579 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5588 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-3473 BI
Publisher (formerly XML Publisher) Security HTTP No 7.7 Network Low Low None
Changed High None None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0   CVE-2016-8281 Oracle
Platform Security for Java Audit Reports HTTP No 7.6 Network Low Low None Un-
changed High Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0   CVE-2016-5536 Oracle
Platform Security for Java Audit Schema HTTP No 7.6 Network Low Low None Un-
changed High Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0   CVE-2016-5495 Oracle
Discoverer EUL Code & Schema HTTP Yes 7.5 Network Low None None Un- changed High
None None 11.1.1.7.0   CVE-2016-5500 Oracle Discoverer Viewer HTTP Yes 7.5
Network Low None None Un- changed High None None 11.1.1.7.0   CVE-2016-5601
Oracle WebLogic Server CIE Related Components HTTP No 6.3 Local Low High
Required Changed Low High None 12.1.3.0, 12.2.1.0, 12.2.1.1   CVE-2016-2107
Oracle Business Intelligence Enterprise Edition Installation HTTPS Yes 5.9
Network High None None Un- changed High None None 11.1.1.7.0, 11.1.1.9.0,
12.1.1.0.0, 12.2.1.1.0   CVE-2016-5537 NetBeans Project Import HTTP No 5.7 Local
Low High None Changed Low Low Low 8.1   CVE-2016-5602 Oracle Data Integrator
Code Generation Engine HTTP No 5.7 Network Low Low Required Un- changed High
None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0 See Note 2
CVE-2016-5488 Oracle WebLogic Server Web Container HTTP Yes 5.3 Network Low None
None Un- changed None None Low 10.3.6.0, 12.1.3.0   CVE-2016-5511 Oracle
WebCenter Sites Security HTTP Yes 4.3 Network Low None Required Un- changed None
Low None 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 See Note 3 CVE-2016-5618 Oracle Data
Integrator Code Generation Engine HTTP No 3.1 Network High Low None Un- changed
Low None None 11.1.1.7.0, 11.1.1.9.0, 12.1.2.0.0, 12.1.3.0.0, 12.2.1.0.0,
12.2.1.1.0 See Note 4 CVE-2016-5506 Oracle Identity Manager App Server XML No
3.1 Local Low High Required Un- changed Low Low None - See Note 5

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Big Data
Discovery Data Processing HTTP Yes 9.8 Network Low None None Un- changed High
High High 1.1.1, 1.1.3, 1.2.0   CVE-2016-3551 Oracle Web Services JAXWS Web
Services Stack HTTP Yes 9.8 Network Low None None Un- changed High High High
11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0   CVE-2015-7501 Oracle WebLogic
Server None HTTP Yes 9.8 Network Low None None Un- changed High High High
10.3.6.0, 12.1.3.0, 12.2.1.0   CVE-2016-5535 Oracle WebLogic Server None HTTP
Yes 9.8 Network Low None None Un- changed High High High 10.3.6.0, 12.1.3.0,
12.2.1.0, 12.2.1.1   CVE-2016-5531 Oracle WebLogic Server WLS-WebServices HTTP
Yes 9.8 Network Low None None Un- changed High High High 10.3.6.0, 12.1.3.0,
12.2.1.0   CVE-2016-1950 Oracle GlassFish Server Security HTTPS Yes 8.8 Network
Low None Required Un- changed High High High 2.1.1   CVE-2016-5519 Oracle
GlassFish Server Java Server Faces Multiple No 8.8 Network Low Low None Un-
changed High High High 2.1.1, 3.0.1, 3.1.2   CVE-2016-3505 Oracle WebLogic
Server JavaServer Faces HTTP No 8.8 Network Low Low None Un- changed High High
High 10.3.6.0, 12.1.3.0, 12.2.1.0   CVE-2016-1950 Oracle iPlanet Web Proxy
Server Security HTTPS Yes 8.8 Network Low None Required Un- changed High High
High 4.0   CVE-2016-1950 Oracle iPlanet Web Server Security HTTPS Yes 8.8
Network Low None Required Un- changed High High High 7.0   CVE-2016-5558 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5574 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5577 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5578 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5579 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-5588 Oracle
Outside In Technology Outside In Filters HTTP Yes 8.6 Network Low None None Un-
changed High Low Low 8.4.0, 8.5.1, 8.5.2, 8.5.3 See Note 1 CVE-2016-3473 BI
Publisher (formerly XML Publisher) Security HTTP No 7.7 Network Low Low None
Changed High None None 11.1.1.7.0, 11.1.1.9.0, 12.2.1.0.0   CVE-2016-8281 Oracle
Platform Security for Java Audit Reports HTTP No 7.6 Network Low Low None Un-
changed High Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0   CVE-2016-5536 Oracle
Platform Security for Java Audit Schema HTTP No 7.6 Network Low Low None Un-
changed High Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0   CVE-2016-5495 Oracle
Discoverer EUL Code & Schema HTTP Yes 7.5 Network Low None None Un- changed High
None None 11.1.1.7.0   CVE-2016-5500 Oracle Discoverer Viewer HTTP Yes 7.5
Network Low None None Un- changed High None None 11.1.1.7.0   CVE-2016-5601
Oracle WebLogic Server CIE Related Components HTTP No 6.3 Local Low High
Required Changed Low High None 12.1.3.0, 12.2.1.0, 12.2.1.1   CVE-2016-2107
Oracle Business Intelligence Enterprise Edition Installation HTTPS Yes 5.9
Network High None None Un- changed High None None 11.1.1.7.0, 11.1.1.9.0,
12.1.1.0.0, 12.2.1.1.0   CVE-2016-5537 NetBeans Project Import HTTP No 5.7 Local
Low High None Changed Low Low Low 8.1   CVE-2016-5602 Oracle Data Integrator
Code Generation Engine HTTP No 5.7 Network Low Low Required Un- changed High
None None 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0 See Note 2
CVE-2016-5488 Oracle WebLogic Server Web Container HTTP Yes 5.3 Network Low None
None Un- changed None None Low 10.3.6.0, 12.1.3.0   CVE-2016-5511 Oracle
WebCenter Sites Security HTTP Yes 4.3 Network Low None Required Un- changed None
Low None 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 See Note 3 CVE-2016-5618 Oracle Data
Integrator Code Generation Engine HTTP No 3.1 Network High Low None Un- changed
Low None None 11.1.1.7.0, 11.1.1.9.0, 12.1.2.0.0, 12.1.3.0.0, 12.2.1.0.0,
12.2.1.1.0 See Note 4 CVE-2016-5506 Oracle Identity Manager App Server XML No
3.1 Local Low High Required Un- changed Low Low None - See Note 5

NOTES:

 1. Outside In Technology is a suite of software development kits (SDKs). The
    protocol and CVSS score depend on the software that uses the Outside In
    Technology code. The CVSS score assumes that the software passes data
    received over a network directly to Outside In Technology code, but if data
    is not received over a network the CVSS score may be lower.
 2. Please refer to My Oracle Support Note 2188855.1 for instructions on how to
    address this issue.
 3. Please refer to My Oracle Support Note 2188873.1 for instructions on how to
    address this issue.
 4. Please refer to My Oracle Support Note 2188871.1 for instructions on how to
    address this issue.
 5. Fixed in all supported releases and patchsets.

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2107 also addresses CVE-2015-3197.
 * The fix for CVE-2016-5535 also addresses CVE-2016-1000031.


APPENDIX - ORACLE ENTERPRISE MANAGER GRID CONTROL

ORACLE ENTERPRISE MANAGER GRID CONTROL EXECUTIVE SUMMARY

This Critical Patch Update contains 5 new security fixes for Oracle Enterprise
Manager Grid Control. 4 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. None of these fixes are applicable to client-only
installations, i.e., installations that do not have Oracle Enterprise Manager
Grid Control installed. The English text form of this Risk Matrix can be found
here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion
Middleware components that are affected by the vulnerabilities listed in the
Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle
Enterprise Manager products is dependent on the Oracle Database and Oracle
Fusion Middleware versions being used. Oracle Database and Oracle Fusion
Middleware security fixes are not listed in the Oracle Enterprise Manager risk
matrix. However, since vulnerabilities affecting Oracle Database and Oracle
Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle
recommends that customers apply the October 2016 Critical Patch Update to the
Oracle Database and Oracle Fusion Middleware components of Enterprise Manager.
For information on what patches need to be applied to your environments, refer
to Critical Patch Update October 2016 Patch Availability Document for Oracle
Products, My Oracle Support Note 2171485.1.

ORACLE ENTERPRISE MANAGER GRID CONTROL RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Enterprise Manager Ops
Center HTTPS Yes 8.2 Network Low None None Un- changed Low None High 12.1.4,
12.2.2, 12.3.2   CVE-2016-4979 Enterprise Manager Ops Center HTTP Yes 7.5
Network Low None None Un- changed None High None 12.1.4, 12.2.2, 12.3.2  
CVE-2015-7940 Enterprise Manager Ops Center HTTPS Yes 7.5 Network Low None None
Un- changed High None None 12.1.4, 12.2.2   CVE-2015-7940 Oracle Application
Testing Suite Load Testing for Web Apps HTTPS Yes 7.5 Network Low None None Un-
changed High None None 12.5.0.1, 12.5.0.2, 12.5.0.3   CVE-2016-5604 Enterprise
Manager Base Platform Security Framework None No 6.3 Local Low High Required
Changed Low High None 12.1.0.5  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Enterprise Manager Ops
Center HTTPS Yes 8.2 Network Low None None Un- changed Low None High 12.1.4,
12.2.2, 12.3.2   CVE-2016-4979 Enterprise Manager Ops Center HTTP Yes 7.5
Network Low None None Un- changed None High None 12.1.4, 12.2.2, 12.3.2  
CVE-2015-7940 Enterprise Manager Ops Center HTTPS Yes 7.5 Network Low None None
Un- changed High None None 12.1.4, 12.2.2   CVE-2015-7940 Oracle Application
Testing Suite Load Testing for Web Apps HTTPS Yes 7.5 Network Low None None Un-
changed High None None 12.5.0.1, 12.5.0.2, 12.5.0.3   CVE-2016-5604 Enterprise
Manager Base Platform Security Framework None No 6.3 Local Low High Required
Changed Low High None 12.1.0.5  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2109, and CVE-2099-1234.
 * The fix for CVE-2016-4979 also addresses CVE-2016-1546.


APPENDIX - ORACLE APPLICATIONS

ORACLE E-BUSINESS SUITE EXECUTIVE SUMMARY

This Critical Patch Update contains 21 new security fixes for the Oracle
E-Business Suite. 14 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion
Middleware components that are affected by the vulnerabilities listed in the
Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle
E-Business Suite products is dependent on the Oracle Database and Oracle Fusion
Middleware versions being used. Oracle Database and Oracle Fusion Middleware
security fixes are not listed in the Oracle E-Business Suite risk matrix.
However, since vulnerabilities affecting Oracle Database and Oracle Fusion
Middleware versions may affect Oracle E-Business Suite products, Oracle
recommends that customers apply the October 2016 Critical Patch Update to the
Oracle Database and Oracle Fusion Middleware components of Oracle E-Business
Suite. For information on what patches need to be applied to your environments,
refer to Oracle E-Business Suite Releases 12 Critical Patch Update Knowledge
Document (October 2016), My Oracle Support Note 2181748.1.

ORACLE E-BUSINESS SUITE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5557 Oracle Advanced Pricing
Price Book HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1,
12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-5589 Oracle CRM
Technical Foundation Responsibility Management HTTP Yes 8.2 Network Low None
None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5,
12.2.6   CVE-2016-5587 Oracle Customer Interaction History Outcome-Result HTTP
Yes 8.2 Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4   CVE-2016-5591 Oracle Customer Interaction History
Outcome-Result HTTP Yes 8.2 Network Low None None Un- changed Low High None
12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5593 Oracle Customer
Interaction History Outcome-Result HTTP Yes 8.2 Network Low None None Un-
changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5592
Oracle Customer Interaction History Result-Reason HTTP Yes 8.2 Network Low None
None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4  
CVE-2016-5595 Oracle Customer Interaction History Result-Reason HTTP Yes 8.2
Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3,
12.2.4   CVE-2016-5586 Oracle Email Center Dispatch/Service Call Requests HTTP
Yes 8.2 Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-2176 Oracle HTTP Server OpenSSL HTTP
Yes 8.2 Network Low None None Un- changed Low None High 12.1.3   CVE-2016-5489
Oracle iStore Runtime Catalog HTTP Yes 8.2 Network Low None Required Changed
High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5562 Oracle
iProcurement Requisition Management HTTP No 7.6 Network Low Low Required Changed
High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5581 Oracle iRecruitment Candidate Self Service None No 6.6 Physical
Low Low None Un- changed High High High 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4,
12.2.5, 12.2.6   CVE-2016-5567 Oracle Applications DBA AD Utilities HTTP No 6.5
Network Low High None Un- changed High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5,
12.2.6   CVE-2016-5570 Oracle Applications DBA AD Utilities HTTP No 6.5 Network
Low High None Un- changed High High None 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5571 Oracle Applications DBA AD Utilities HTTP No 6.5 Network Low High
None Un- changed High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5585 Oracle Interaction Center Intelligence Select Application
Dependencies HTTP Yes 6.5 Network Low None None Un- changed Low Low None 12.1.1,
12.1.2, 12.1.3   CVE-2016-5517 Oracle Applications DBA AD Utilities None No 5.5
Local Low Low None Un- changed High None None 12.1.3   CVE-2016-5575 Oracle
Common Applications Calendar Resources Module HTTP Yes 5.3 Network Low None None
Un- changed Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
  CVE-2016-5583 Oracle One-to-One Fulfillment File Upload HTTP Yes 5.3 Network
Low None None Un- changed None Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4,
12.2.5, 12.2.6   CVE-2016-5532 Oracle Shipping Execution Workflow Events HTTP
Yes 5.3 Network Low None None Un- changed Low None None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-5596 Oracle CRM Technical Foundation
Default Responsibility HTTP No 4.3 Network Low Low None Un- changed Low None
None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5557 Oracle Advanced Pricing
Price Book HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1,
12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-5589 Oracle CRM
Technical Foundation Responsibility Management HTTP Yes 8.2 Network Low None
None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5,
12.2.6   CVE-2016-5587 Oracle Customer Interaction History Outcome-Result HTTP
Yes 8.2 Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4   CVE-2016-5591 Oracle Customer Interaction History
Outcome-Result HTTP Yes 8.2 Network Low None None Un- changed Low High None
12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5593 Oracle Customer
Interaction History Outcome-Result HTTP Yes 8.2 Network Low None None Un-
changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5592
Oracle Customer Interaction History Result-Reason HTTP Yes 8.2 Network Low None
None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4  
CVE-2016-5595 Oracle Customer Interaction History Result-Reason HTTP Yes 8.2
Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3, 12.2.3,
12.2.4   CVE-2016-5586 Oracle Email Center Dispatch/Service Call Requests HTTP
Yes 8.2 Network Low None None Un- changed Low High None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-2176 Oracle HTTP Server OpenSSL HTTP
Yes 8.2 Network Low None None Un- changed Low None High 12.1.3   CVE-2016-5489
Oracle iStore Runtime Catalog HTTP Yes 8.2 Network Low None Required Changed
High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4   CVE-2016-5562 Oracle
iProcurement Requisition Management HTTP No 7.6 Network Low Low Required Changed
High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5581 Oracle iRecruitment Candidate Self Service None No 6.6 Physical
Low Low None Un- changed High High High 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4,
12.2.5, 12.2.6   CVE-2016-5567 Oracle Applications DBA AD Utilities HTTP No 6.5
Network Low High None Un- changed High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5,
12.2.6   CVE-2016-5570 Oracle Applications DBA AD Utilities HTTP No 6.5 Network
Low High None Un- changed High High None 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5571 Oracle Applications DBA AD Utilities HTTP No 6.5 Network Low High
None Un- changed High High None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  
CVE-2016-5585 Oracle Interaction Center Intelligence Select Application
Dependencies HTTP Yes 6.5 Network Low None None Un- changed Low Low None 12.1.1,
12.1.2, 12.1.3   CVE-2016-5517 Oracle Applications DBA AD Utilities None No 5.5
Local Low Low None Un- changed High None None 12.1.3   CVE-2016-5575 Oracle
Common Applications Calendar Resources Module HTTP Yes 5.3 Network Low None None
Un- changed Low None None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6
  CVE-2016-5583 Oracle One-to-One Fulfillment File Upload HTTP Yes 5.3 Network
Low None None Un- changed None Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4,
12.2.5, 12.2.6   CVE-2016-5532 Oracle Shipping Execution Workflow Events HTTP
Yes 5.3 Network Low None None Un- changed Low None None 12.1.1, 12.1.2, 12.1.3,
12.2.3, 12.2.4, 12.2.5, 12.2.6   CVE-2016-5596 Oracle CRM Technical Foundation
Default Responsibility HTTP No 4.3 Network Low Low None Un- changed Low None
None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2176 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2107, and CVE-2016-2109.

ORACLE SUPPLY CHAIN PRODUCTS SUITE EXECUTIVE SUMMARY

This Critical Patch Update contains 19 new security fixes for the Oracle Supply
Chain Products Suite. 9 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

ORACLE SUPPLY CHAIN PRODUCTS SUITE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5599 Oracle Advanced Supply
Chain Planning MscObieeSrvlt HTTP Yes 9.1 Network Low None None Un- changed High
High None 12.2.3, 12.2.4, 12.2.5   CVE-2015-7501 Oracle Agile PLM Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 9.3.4,
9.3.5   CVE-2016-5523 Oracle Agile PLM AutoVue Java Applet HTTP No 8.8 Network
Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2015-3253 Oracle
Agile PLM Event Java PX HTTP No 8.8 Network Low Low None Un- changed High High
High 9.3.4, 9.3.5   CVE-2016-5514 Oracle Agile PLM ExportServlet HTTP No 8.8
Network Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2016-5515
Oracle Agile PLM RMIServlet HTTP No 8.8 Network Low Low None Un- changed High
High High 9.3.4, 9.3.5   CVE-2016-0635 Oracle Agile PLM Spring HTTP No 8.8
Network Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2016-0714
Oracle Transportation Management Install HTTP No 8.8 Network Low Low None Un-
changed High High High 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5,
6.3.6, 6.3.7   CVE-2016-2107 Oracle Transportation Management Install HTTP Yes
8.2 Network Low None None Un- changed Low None High 6.1, 6.2   CVE-2016-5518
Oracle Agile Engineering Data Management webfileservices HTTP Yes 8.1 Network
High None None Un- changed High High High 6.1.3.0, 6.2.0.0   CVE-2016-5526
Oracle Agile PLM Apache Tomcat HTTP Yes 7.3 Network Low None None Un- changed
Low Low Low 9.3.4, 9.3.5   CVE-2016-5521 Oracle Agile PLM Security HTTP Yes 6.5
Network Low None None Un- changed Low Low None 9.3.4, 9.3.5   CVE-2016-5512
Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low
None 9.3.4, 9.3.5   CVE-2016-5527 Oracle Agile PLM Security HTTP Yes 5.9 Network
High None None Un- changed High None None 9.3.4, 9.3.5   CVE-2016-5510 Oracle
Agile PLM Folders, Files & Attachments HTTP Yes 5.3 Network Low None None Un-
changed Low None None 9.3.4, 9.3.5   CVE-2016-5524 Oracle Agile PLM Security
HTTP Yes 5.3 Network Low None None Un- changed Low None None 9.3.4, 9.3.5  
CVE-2016-5513 Oracle Agile PLM File Manager HTTP No 4.3 Network Low Low None Un-
changed Low None None 9.3.4, 9.3.5   CVE-2016-5522 Oracle Agile PLM Security
HTTP No 4.3 Network Low Low None Un- changed Low None None 9.3.4, 9.3.5  
CVE-2016-5504 Oracle Agile Product Lifecycle Management for Process Supplier
Portal HTTP No 4.1 Local High High None Un- changed High None None 6.1.0.4,
6.1.1.6, 6.2.0.0  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5599 Oracle Advanced Supply
Chain Planning MscObieeSrvlt HTTP Yes 9.1 Network Low None None Un- changed High
High None 12.2.3, 12.2.4, 12.2.5   CVE-2015-7501 Oracle Agile PLM Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 9.3.4,
9.3.5   CVE-2016-5523 Oracle Agile PLM AutoVue Java Applet HTTP No 8.8 Network
Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2015-3253 Oracle
Agile PLM Event Java PX HTTP No 8.8 Network Low Low None Un- changed High High
High 9.3.4, 9.3.5   CVE-2016-5514 Oracle Agile PLM ExportServlet HTTP No 8.8
Network Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2016-5515
Oracle Agile PLM RMIServlet HTTP No 8.8 Network Low Low None Un- changed High
High High 9.3.4, 9.3.5   CVE-2016-0635 Oracle Agile PLM Spring HTTP No 8.8
Network Low Low None Un- changed High High High 9.3.4, 9.3.5   CVE-2016-0714
Oracle Transportation Management Install HTTP No 8.8 Network Low Low None Un-
changed High High High 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5,
6.3.6, 6.3.7   CVE-2016-2107 Oracle Transportation Management Install HTTP Yes
8.2 Network Low None None Un- changed Low None High 6.1, 6.2   CVE-2016-5518
Oracle Agile Engineering Data Management webfileservices HTTP Yes 8.1 Network
High None None Un- changed High High High 6.1.3.0, 6.2.0.0   CVE-2016-5526
Oracle Agile PLM Apache Tomcat HTTP Yes 7.3 Network Low None None Un- changed
Low Low Low 9.3.4, 9.3.5   CVE-2016-5521 Oracle Agile PLM Security HTTP Yes 6.5
Network Low None None Un- changed Low Low None 9.3.4, 9.3.5   CVE-2016-5512
Oracle Agile PLM Security HTTP Yes 6.1 Network Low None Required Changed Low Low
None 9.3.4, 9.3.5   CVE-2016-5527 Oracle Agile PLM Security HTTP Yes 5.9 Network
High None None Un- changed High None None 9.3.4, 9.3.5   CVE-2016-5510 Oracle
Agile PLM Folders, Files & Attachments HTTP Yes 5.3 Network Low None None Un-
changed Low None None 9.3.4, 9.3.5   CVE-2016-5524 Oracle Agile PLM Security
HTTP Yes 5.3 Network Low None None Un- changed Low None None 9.3.4, 9.3.5  
CVE-2016-5513 Oracle Agile PLM File Manager HTTP No 4.3 Network Low Low None Un-
changed Low None None 9.3.4, 9.3.5   CVE-2016-5522 Oracle Agile PLM Security
HTTP No 4.3 Network Low Low None Un- changed Low None None 9.3.4, 9.3.5  
CVE-2016-5504 Oracle Agile Product Lifecycle Management for Process Supplier
Portal HTTP No 4.1 Local High High None Un- changed High None None 6.1.0.4,
6.1.1.6, 6.2.0.0  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706, and
   CVE-2016-0763.
 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2109, and CVE-2016-2176.

ORACLE PEOPLESOFT PRODUCTS EXECUTIVE SUMMARY

This Critical Patch Update contains 11 new security fixes for Oracle PeopleSoft
Products. 5 of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE PEOPLESOFT PRODUCTS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-8293 PeopleSoft Enterprise
PeopleTools Integration Broker HTTP Yes 8.2 Network Low None Required Changed
High Low None 8.54, 8.55   CVE-2016-8291 PeopleSoft Enterprise PeopleTools
Mobile Application Platform HTTP Yes 8.2 Network Low None Required Changed High
Low None 8.54, 8.55   CVE-2016-8296 PeopleSoft Enterprise PeopleTools LDAP HTTP
No 7.6 Network Low Low Required Changed High Low None 8.54, 8.55   CVE-2015-7940
PeopleSoft Enterprise PeopleTools Bouncy Castle Java HTTP Yes 7.5 Network Low
None None Un- changed High None None 8.54, 8.55   CVE-2016-5529 PeopleSoft
Enterprise PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required
Changed Low Low None 8.54, 8.55   CVE-2016-5530 PeopleSoft Enterprise
PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required Changed
Low Low None 8.54, 8.55   CVE-2016-5600 PeopleSoft Enterprise SCM Services
Procurement Security HTTP No 5.4 Network Low Low None Un- changed Low Low None
9.1, 9.2   CVE-2016-8285 PeopleSoft Enterprise HCM Candidate Gateway HTTP No 4.8
Network High High Required Un- changed High Low None 9.2   CVE-2016-8295
PeopleSoft Enterprise HCM Schedule HTTP No 4.3 Network Low Low None Un- changed
Low None None 9.2   CVE-2016-8294 PeopleSoft Enterprise PeopleTools Query HTTP
No 4.3 Network Low Low None Un- changed Low None None 8.54, 8.55   CVE-2016-8292
PeopleSoft Enterprise HCM Talent Acquisition Manager HTTP No 4.2 Network High
Low None Un- changed Low Low None 9.2  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-8293 PeopleSoft Enterprise
PeopleTools Integration Broker HTTP Yes 8.2 Network Low None Required Changed
High Low None 8.54, 8.55   CVE-2016-8291 PeopleSoft Enterprise PeopleTools
Mobile Application Platform HTTP Yes 8.2 Network Low None Required Changed High
Low None 8.54, 8.55   CVE-2016-8296 PeopleSoft Enterprise PeopleTools LDAP HTTP
No 7.6 Network Low Low Required Changed High Low None 8.54, 8.55   CVE-2015-7940
PeopleSoft Enterprise PeopleTools Bouncy Castle Java HTTP Yes 7.5 Network Low
None None Un- changed High None None 8.54, 8.55   CVE-2016-5529 PeopleSoft
Enterprise PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required
Changed Low Low None 8.54, 8.55   CVE-2016-5530 PeopleSoft Enterprise
PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required Changed
Low Low None 8.54, 8.55   CVE-2016-5600 PeopleSoft Enterprise SCM Services
Procurement Security HTTP No 5.4 Network Low Low None Un- changed Low Low None
9.1, 9.2   CVE-2016-8285 PeopleSoft Enterprise HCM Candidate Gateway HTTP No 4.8
Network High High Required Un- changed High Low None 9.2   CVE-2016-8295
PeopleSoft Enterprise HCM Schedule HTTP No 4.3 Network Low Low None Un- changed
Low None None 9.2   CVE-2016-8294 PeopleSoft Enterprise PeopleTools Query HTTP
No 4.3 Network Low Low None Un- changed Low None None 8.54, 8.55   CVE-2016-8292
PeopleSoft Enterprise HCM Talent Acquisition Manager HTTP No 4.2 Network High
Low None Un- changed Low Low None 9.2  

ORACLE JD EDWARDS PRODUCTS EXECUTIVE SUMMARY

This Critical Patch Update contains 2 new security fixes for Oracle JD Edwards
Products. Both of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE JD EDWARDS PRODUCTS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-1181 JD Edwards EnterpriseOne
Tools Portal SEC HTTP Yes 8.1 Network High None None Un- changed High High High
9.1   CVE-2015-1793 JD Edwards World Security GUI / World Vision HTTPS Yes 6.5
Network Low None None Un- changed Low Low None A9.4  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-1181 JD Edwards EnterpriseOne
Tools Portal SEC HTTP Yes 8.1 Network High None None Un- changed High High High
9.1   CVE-2015-1793 JD Edwards World Security GUI / World Vision HTTPS Yes 6.5
Network Low None None Un- changed Low Low None A9.4  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-1181 also addresses CVE-2016-1182.

ORACLE SIEBEL CRM EXECUTIVE SUMMARY

This Critical Patch Update contains 3 new security fixes for Oracle Siebel CRM.
1 of these vulnerabilities may be remotely exploitable without authentication,
i.e., may be exploited over a network without requiring user credentials. The
English text form of this Risk Matrix can be found here.

ORACLE SIEBEL CRM RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-3081 Siebel Apps - E-Billing
Security HTTP Yes 8.1 Network High None None Un- changed High High High 7.1  
CVE-2016-5534 Siebel Apps - Customer Order Management Customizable
Prod/Configurator HTTP No 6.5 Network Low Low None Un- changed High None None
16.1   CVE-2016-5560 Siebel UI Framework OpenUI HTTP No 5.4 Network Low Low None
Un- changed Low Low None 16.1  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-3081 Siebel Apps - E-Billing
Security HTTP Yes 8.1 Network High None None Un- changed High High High 7.1  
CVE-2016-5534 Siebel Apps - Customer Order Management Customizable
Prod/Configurator HTTP No 6.5 Network Low Low None Un- changed High None None
16.1   CVE-2016-5560 Siebel UI Framework OpenUI HTTP No 5.4 Network Low Low None
Un- changed Low Low None 16.1  

ORACLE COMMERCE EXECUTIVE SUMMARY

This Critical Patch Update contains 7 new security fixes for Oracle Commerce. 4
of these vulnerabilities may be remotely exploitable without authentication,
i.e., may be exploited over a network without requiring user credentials. The
English text form of this Risk Matrix can be found here.

ORACLE COMMERCE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Commerce Platform
Dynamo Application Framework HTTP Yes 9.8 Network Low None None Un- changed High
High High 10.0.3.5, 10.2.0.5, 11.2.0.1   CVE-2015-7501 Oracle Commerce Guided
Search / Oracle Commerce Experience Manager Content Acquisition System HTTP No
8.8 Network Low Low None Un- changed High High High 3.1.1, 3.1.2, 11.0, 11.1,
11.2   CVE-2016-0635 Oracle Commerce Guided Search / Oracle Commerce Experience
Manager Content Acquisition System HTTP No 8.8 Network Low Low None Un- changed
High High High 3.1.1, 3.1.2, 11.0, 11.1, 11.2   CVE-2016-0635 Oracle Commerce
Guided Search / Oracle Commerce Experience Manager Tools and Frameworks HTTP No
8.8 Network Low Low None Un- changed High High High 3.1.1, 3.1.2, 11.0, 11.1,
11.2   CVE-2016-5482 Oracle Commerce Guided Search Oracle Commerce Guided Search
HTTP Yes 8.2 Network Low None Required Changed High Low None 6.2.2, 6.3.0,
6.4.1.2, 6.5.0, 6.5.1, 6.5.2   CVE-2016-2107 Oracle Commerce Guided Search /
Oracle Commerce Experience Manager MDEX HTTPS Yes 8.2 Network Low None None Un-
changed Low None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2   CVE-2016-5491
Oracle Commerce Service Center Commerce Service Center HTTP Yes 8.2 Network Low
None Required Changed High Low None 10.0.3.5, 10.2.0.5  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Commerce Platform
Dynamo Application Framework HTTP Yes 9.8 Network Low None None Un- changed High
High High 10.0.3.5, 10.2.0.5, 11.2.0.1   CVE-2015-7501 Oracle Commerce Guided
Search / Oracle Commerce Experience Manager Content Acquisition System HTTP No
8.8 Network Low Low None Un- changed High High High 3.1.1, 3.1.2, 11.0, 11.1,
11.2   CVE-2016-0635 Oracle Commerce Guided Search / Oracle Commerce Experience
Manager Content Acquisition System HTTP No 8.8 Network Low Low None Un- changed
High High High 3.1.1, 3.1.2, 11.0, 11.1, 11.2   CVE-2016-0635 Oracle Commerce
Guided Search / Oracle Commerce Experience Manager Tools and Frameworks HTTP No
8.8 Network Low Low None Un- changed High High High 3.1.1, 3.1.2, 11.0, 11.1,
11.2   CVE-2016-5482 Oracle Commerce Guided Search Oracle Commerce Guided Search
HTTP Yes 8.2 Network Low None Required Changed High Low None 6.2.2, 6.3.0,
6.4.1.2, 6.5.0, 6.5.1, 6.5.2   CVE-2016-2107 Oracle Commerce Guided Search /
Oracle Commerce Experience Manager MDEX HTTPS Yes 8.2 Network Low None None Un-
changed Low None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2   CVE-2016-5491
Oracle Commerce Service Center Commerce Service Center HTTP Yes 8.2 Network Low
None Required Changed High Low None 10.0.3.5, 10.2.0.5  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2109, and CVE-2016-2176.


APPENDIX - ORACLE COMMUNICATIONS APPLICATIONS

ORACLE COMMUNICATIONS APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 16 new security fixes for Oracle
Communications Applications. 10 of these vulnerabilities may be remotely
exploitable without authentication, i.e., may be exploited over a network
without the need for a username and password. The English text form of this Risk
Matrix can be found here.

ORACLE COMMUNICATIONS APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 8.2 Network Low None None Un- changed
Low None High Ecz7.3m1p4 and earlier   CVE-2015-0235 Oracle Communications
Policy Management Glibc Multiple Yes 7.3 Network Low None None Un- changed Low
Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0411 Oracle
Communications Policy Management MySQL Multiple Yes 7.3 Network Low None None
Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0050
Oracle Communications Policy Management Tomcat Multiple Yes 7.3 Network Low None
None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2014-0224 Oracle Communications Policy Management OpenSSL SSL Yes 7.3
Network Low None None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2015-0286 Oracle Communications Policy Management OpenSSL SSL Yes
7.3 Network Low None None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1
and earlier   CVE-2013-2067 Oracle Communications Policy Management Tomcat
Multiple Yes 6.5 Network Low None None Un- changed None Low Low 9.7.3, 9.9.1,
10.4.1, 12.1.1 and earlier   CVE-2014-0227 Oracle Communications Policy
Management Tomcat Multiple Yes 6.5 Network Low None None Un- changed None Low
Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-2566 Oracle Enterprise
Session Border Controller Security SSH Yes 5.9 Network High None None Un-
changed High None None Ecz7.3m1p4 and earlier   CVE-2015-3197 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 5.9 Network High None None Un- changed
High None None Ecz7.3m1p4 and earlier   CVE-2013-4444 Oracle Communications
Policy Management Tomcat Multiple Yes 5.6 Network High None None Un- changed Low
Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-2067 Oracle
Communications Policy Management Tomcat Multiple Yes 5.6 Network High None None
Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0224
Oracle Enterprise Communications Broker OpenSSL SSL Yes 5.6 Network High None
None Un- changed Low Low Low Pcz2.0.0m4p5 and earlier   CVE-2014-0224 Oracle
Enterprise Session Border Controller OpenSSL SSL Yes 5.6 Network High None None
Un- changed Low Low Low Ecz7.3m1p4 and earlier   CVE-2015-1791 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 5.6 Network High None None Un- changed
Low Low Low Ecz7.3m1p4 and earlier   CVE-2015-2568 Oracle Communications Policy
Management MySQL Multiple Yes 5.3 Network Low None None Un- changed None None
Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0096 Oracle
Communications Policy Management Tomcat Multiple Yes 5.3 Network Low None None
Un- changed Low None None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2013-4590 Oracle Communications Policy Management Tomcat Multiple Yes 5.3
Network Low None None Un- changed Low None None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2014-0099 Oracle Communications Policy Management Tomcat Multiple
Yes 5.3 Network Low None None Un- changed None Low None 9.7.3, 9.9.1, 10.4.1,
12.1.1 and earlier   CVE-2014-0075 Oracle Communications Policy Management
Tomcat Multiple Yes 5.3 Network Low None None Un- changed None None Low 9.7.3,
9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0119 Oracle Communications Policy
Management Tomcat Multiple Yes 5.3 Network Low None None Un- changed Low None
None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-4322 Oracle
Communications Policy Management Tomcat Multiple Yes 5.3 Network Low None None
Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2014-9296 Oracle Communications Policy Management NTP NTP Yes 5.3 Network
Low None None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier
  CVE-2014-3571 Oracle Communications Policy Management OpenSSL SSL Yes 5.3
Network Low None None Un- changed None Low None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2014-3571 Oracle Enterprise Communications Broker OpenSSL SSL Yes
5.3 Network Low None None Un- changed None None Low Pcz2.0.0m4p5 and earlier  
CVE-2014-3571 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2015-0286 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2015-3195 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2014-2532 Oracle Communications Policy Management Security SSH No 4.9
Network High Low None Changed Low Low None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2013-4286 Oracle Communications Policy Management Tomcat Multiple
Yes 4.8 Network High None None Un- changed Low Low None 9.7.3, 9.9.1, 10.4.1,
12.1.1 and earlier   CVE-2015-0433 Oracle Communications Policy Management MySQL
Multiple No 4.4 Network High High None Un- changed None None High 9.7.3, 9.9.1,
10.4.1, 12.1.1 and earlier   CVE-2015-0423 Oracle Communications Policy
Management MySQL Multiple No 4.3 Network Low Low None Un- changed None None Low
9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0500 Oracle Communications
Policy Management MySQL Multiple No 4.3 Network Low Low None Un- changed None
None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0409 Oracle
Communications Policy Management MySQL Multiple No 4.3 Network Low Low None Un-
changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0381
Oracle Communications Policy Management MySQL Multiple Yes 3.7 Network High None
None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2015-0382 Oracle Communications Policy Management MySQL Multiple Yes 3.7
Network High None None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1
and earlier  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 8.2 Network Low None None Un- changed
Low None High Ecz7.3m1p4 and earlier   CVE-2015-0235 Oracle Communications
Policy Management Glibc Multiple Yes 7.3 Network Low None None Un- changed Low
Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0411 Oracle
Communications Policy Management MySQL Multiple Yes 7.3 Network Low None None
Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0050
Oracle Communications Policy Management Tomcat Multiple Yes 7.3 Network Low None
None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2014-0224 Oracle Communications Policy Management OpenSSL SSL Yes 7.3
Network Low None None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2015-0286 Oracle Communications Policy Management OpenSSL SSL Yes
7.3 Network Low None None Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1
and earlier   CVE-2013-2067 Oracle Communications Policy Management Tomcat
Multiple Yes 6.5 Network Low None None Un- changed None Low Low 9.7.3, 9.9.1,
10.4.1, 12.1.1 and earlier   CVE-2014-0227 Oracle Communications Policy
Management Tomcat Multiple Yes 6.5 Network Low None None Un- changed None Low
Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-2566 Oracle Enterprise
Session Border Controller Security SSH Yes 5.9 Network High None None Un-
changed High None None Ecz7.3m1p4 and earlier   CVE-2015-3197 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 5.9 Network High None None Un- changed
High None None Ecz7.3m1p4 and earlier   CVE-2013-4444 Oracle Communications
Policy Management Tomcat Multiple Yes 5.6 Network High None None Un- changed Low
Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-2067 Oracle
Communications Policy Management Tomcat Multiple Yes 5.6 Network High None None
Un- changed Low Low Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0224
Oracle Enterprise Communications Broker OpenSSL SSL Yes 5.6 Network High None
None Un- changed Low Low Low Pcz2.0.0m4p5 and earlier   CVE-2014-0224 Oracle
Enterprise Session Border Controller OpenSSL SSL Yes 5.6 Network High None None
Un- changed Low Low Low Ecz7.3m1p4 and earlier   CVE-2015-1791 Oracle Enterprise
Session Border Controller OpenSSL SSL Yes 5.6 Network High None None Un- changed
Low Low Low Ecz7.3m1p4 and earlier   CVE-2015-2568 Oracle Communications Policy
Management MySQL Multiple Yes 5.3 Network Low None None Un- changed None None
Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0096 Oracle
Communications Policy Management Tomcat Multiple Yes 5.3 Network Low None None
Un- changed Low None None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2013-4590 Oracle Communications Policy Management Tomcat Multiple Yes 5.3
Network Low None None Un- changed Low None None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2014-0099 Oracle Communications Policy Management Tomcat Multiple
Yes 5.3 Network Low None None Un- changed None Low None 9.7.3, 9.9.1, 10.4.1,
12.1.1 and earlier   CVE-2014-0075 Oracle Communications Policy Management
Tomcat Multiple Yes 5.3 Network Low None None Un- changed None None Low 9.7.3,
9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2014-0119 Oracle Communications Policy
Management Tomcat Multiple Yes 5.3 Network Low None None Un- changed Low None
None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2013-4322 Oracle
Communications Policy Management Tomcat Multiple Yes 5.3 Network Low None None
Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2014-9296 Oracle Communications Policy Management NTP NTP Yes 5.3 Network
Low None None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier
  CVE-2014-3571 Oracle Communications Policy Management OpenSSL SSL Yes 5.3
Network Low None None Un- changed None Low None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2014-3571 Oracle Enterprise Communications Broker OpenSSL SSL Yes
5.3 Network Low None None Un- changed None None Low Pcz2.0.0m4p5 and earlier  
CVE-2014-3571 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2015-0286 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2015-3195 Oracle Enterprise Session Border Controller OpenSSL SSL Yes 5.3
Network Low None None Un- changed None None Low Ecz7.3m1p4 and earlier  
CVE-2014-2532 Oracle Communications Policy Management Security SSH No 4.9
Network High Low None Changed Low Low None 9.7.3, 9.9.1, 10.4.1, 12.1.1 and
earlier   CVE-2013-4286 Oracle Communications Policy Management Tomcat Multiple
Yes 4.8 Network High None None Un- changed Low Low None 9.7.3, 9.9.1, 10.4.1,
12.1.1 and earlier   CVE-2015-0433 Oracle Communications Policy Management MySQL
Multiple No 4.4 Network High High None Un- changed None None High 9.7.3, 9.9.1,
10.4.1, 12.1.1 and earlier   CVE-2015-0423 Oracle Communications Policy
Management MySQL Multiple No 4.3 Network Low Low None Un- changed None None Low
9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0500 Oracle Communications
Policy Management MySQL Multiple No 4.3 Network Low Low None Un- changed None
None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0409 Oracle
Communications Policy Management MySQL Multiple No 4.3 Network Low Low None Un-
changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier   CVE-2015-0381
Oracle Communications Policy Management MySQL Multiple Yes 3.7 Network High None
None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1 and earlier  
CVE-2015-0382 Oracle Communications Policy Management MySQL Multiple Yes 3.7
Network High None None Un- changed None None Low 9.7.3, 9.9.1, 10.4.1, 12.1.1
and earlier  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2014-9296 also addresses CVE-2014-9293, CVE-2014-9294, and
   CVE-2014-9295.
 * The fix for CVE-2015-1791 also addresses CVE-2015-1788, CVE-2015-1789,
   CVE-2015-1790, and CVE-2015-1792.


APPENDIX - ORACLE FINANCIAL SERVICES APPLICATIONS

ORACLE FINANCIAL SERVICES APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 24 new security fixes for Oracle Financial
Services Applications. 3 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

ORACLE FINANCIAL SERVICES APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Oracle FLEXCUBE Core
Banking Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed
High High High 11.5.0.0.0, 11.6.0.0.0   CVE-2015-7501 Oracle FLEXCUBE Enterprise
Limits and Collateral Management Apache Commons Collections HTTP No 8.8 Network
Low Low None Un- changed High High High 12.0.0, 12.1.0   CVE-2015-7501 Oracle
FLEXCUBE Investor Servicing Apache Commons Collections HTTP No 8.8 Network Low
Low None Un- changed High High High 12.0.1   CVE-2015-7501 Oracle FLEXCUBE
Private Banking Apache Commons Collections HTTP No 8.8 Network Low Low None Un-
changed High High High 2.0.0, 2.0.1, 2.2.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3,
12.1.0   CVE-2015-7501 Oracle FLEXCUBE Universal Banking Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 12.87.1,
12.87.2   CVE-2015-7501 Oracle FLEXCUBE Universal Banking Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 11.3.0,
11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5607 Oracle FLEXCUBE
Universal Banking INFRA HTTP No 8.8 Network Low Low None Un- changed High High
High 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2015-7501
Oracle Financial Services Analytical Applications Infrastructure Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 7.3.0,
7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 8.0.0, 8.0.1, 8.0.2, 8.0.3   CVE-2016-0635
Oracle Financial Services Analytical Applications Infrastructure Inline
Processing HTTP No 8.8 Network Low Low None Un- changed High High High 8.0.0,
8.0.1, 8.0.2, 8.0.3   CVE-2015-7501 Oracle Financial Services Lending and
Leasing Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed
High High High 14.1.0, 14.2.0   CVE-2016-5622 Oracle FLEXCUBE Universal Banking
INFRA HTTP Yes 8.2 Network Low None Required Changed High Low None 11.3.0,
11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-3081 Oracle FLEXCUBE
Private Banking Struts HTTP Yes 8.1 Network High None None Un- changed High High
High 2.0.0, 2.0.1, 2.2.0, 12.0.1, 12.0.3, 12.1.0   CVE-2016-5619 Oracle FLEXCUBE
Universal Banking INFRA HTTP No 8.1 Network Low Low None Un- changed High High
None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5543
Oracle FLEXCUBE Enterprise Limits and Collateral Management INFRA HTTP Yes 6.1
Network Low None Required Changed Low Low None 12.0.0, 12.1.0   CVE-2016-5569
Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and
Collateral HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.0,
12.1.0   CVE-2016-5502 Oracle FLEXCUBE Universal Banking INFRA HTTP No 5.4
Network Low Low None Un- changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3   CVE-2016-5620 Oracle FLEXCUBE Universal Banking INFRA HTTP No 5.4
Network Low Low None Un- changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3, 12.1.0, 12.2.0   CVE-2016-5594 Oracle FLEXCUBE Universal Banking INFRA
HTTP No 5.0 Network Low Low None Changed Low None None 11.3.0, 11.4.0, 12.0.1,
12.0.2, 12.0.3   CVE-2016-5479 Oracle FLEXCUBE Universal Banking INFRA HTTP No
4.3 Network Low Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1  
CVE-2016-5603 Oracle FLEXCUBE Universal Banking INFRA HTTP No 4.3 Network Low
Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3,
12.1.0, 12.2.0   CVE-2016-5621 Oracle FLEXCUBE Universal Banking INFRA HTTP No
4.3 Network Low Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1,
12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5493 Oracle FLEXCUBE Private Banking
Admin HTTP No 4.2 Network High Low None Un- changed Low Low None 12.0.1, 12.0.2,
12.0.3   CVE-2016-5490 Oracle FLEXCUBE Universal Banking INFRA NONE No 3.3 Local
Low Low None Un- changed Low None None 11.4.0   CVE-2015-7501 Oracle Banking
Digital Experience Apache Commons Collections HTTP No 2.0 Network High High
Required Un- changed Low None None 15.1  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Oracle FLEXCUBE Core
Banking Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed
High High High 11.5.0.0.0, 11.6.0.0.0   CVE-2015-7501 Oracle FLEXCUBE Enterprise
Limits and Collateral Management Apache Commons Collections HTTP No 8.8 Network
Low Low None Un- changed High High High 12.0.0, 12.1.0   CVE-2015-7501 Oracle
FLEXCUBE Investor Servicing Apache Commons Collections HTTP No 8.8 Network Low
Low None Un- changed High High High 12.0.1   CVE-2015-7501 Oracle FLEXCUBE
Private Banking Apache Commons Collections HTTP No 8.8 Network Low Low None Un-
changed High High High 2.0.0, 2.0.1, 2.2.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3,
12.1.0   CVE-2015-7501 Oracle FLEXCUBE Universal Banking Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 12.87.1,
12.87.2   CVE-2015-7501 Oracle FLEXCUBE Universal Banking Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 11.3.0,
11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5607 Oracle FLEXCUBE
Universal Banking INFRA HTTP No 8.8 Network Low Low None Un- changed High High
High 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2015-7501
Oracle Financial Services Analytical Applications Infrastructure Apache Commons
Collections HTTP No 8.8 Network Low Low None Un- changed High High High 7.3.0,
7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 8.0.0, 8.0.1, 8.0.2, 8.0.3   CVE-2016-0635
Oracle Financial Services Analytical Applications Infrastructure Inline
Processing HTTP No 8.8 Network Low Low None Un- changed High High High 8.0.0,
8.0.1, 8.0.2, 8.0.3   CVE-2015-7501 Oracle Financial Services Lending and
Leasing Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed
High High High 14.1.0, 14.2.0   CVE-2016-5622 Oracle FLEXCUBE Universal Banking
INFRA HTTP Yes 8.2 Network Low None Required Changed High Low None 11.3.0,
11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-3081 Oracle FLEXCUBE
Private Banking Struts HTTP Yes 8.1 Network High None None Un- changed High High
High 2.0.0, 2.0.1, 2.2.0, 12.0.1, 12.0.3, 12.1.0   CVE-2016-5619 Oracle FLEXCUBE
Universal Banking INFRA HTTP No 8.1 Network Low Low None Un- changed High High
None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5543
Oracle FLEXCUBE Enterprise Limits and Collateral Management INFRA HTTP Yes 6.1
Network Low None Required Changed Low Low None 12.0.0, 12.1.0   CVE-2016-5569
Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and
Collateral HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.0,
12.1.0   CVE-2016-5502 Oracle FLEXCUBE Universal Banking INFRA HTTP No 5.4
Network Low Low None Un- changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3   CVE-2016-5620 Oracle FLEXCUBE Universal Banking INFRA HTTP No 5.4
Network Low Low None Un- changed Low Low None 11.3.0, 11.4.0, 12.0.1, 12.0.2,
12.0.3, 12.1.0, 12.2.0   CVE-2016-5594 Oracle FLEXCUBE Universal Banking INFRA
HTTP No 5.0 Network Low Low None Changed Low None None 11.3.0, 11.4.0, 12.0.1,
12.0.2, 12.0.3   CVE-2016-5479 Oracle FLEXCUBE Universal Banking INFRA HTTP No
4.3 Network Low Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1  
CVE-2016-5603 Oracle FLEXCUBE Universal Banking INFRA HTTP No 4.3 Network Low
Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3,
12.1.0, 12.2.0   CVE-2016-5621 Oracle FLEXCUBE Universal Banking INFRA HTTP No
4.3 Network Low Low None Un- changed Low None None 11.3.0, 11.4.0, 12.0.1,
12.0.2, 12.0.3, 12.1.0, 12.2.0   CVE-2016-5493 Oracle FLEXCUBE Private Banking
Admin HTTP No 4.2 Network High Low None Un- changed Low Low None 12.0.1, 12.0.2,
12.0.3   CVE-2016-5490 Oracle FLEXCUBE Universal Banking INFRA NONE No 3.3 Local
Low Low None Un- changed Low None None 11.4.0   CVE-2015-7501 Oracle Banking
Digital Experience Apache Commons Collections HTTP No 2.0 Network High High
Required Un- changed Low None None 15.1  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-3081 also addresses CVE-2014-7809.


APPENDIX - ORACLE HEALTH SCIENCES APPLICATIONS

ORACLE HEALTH SCIENCES APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 1 new security fix for Oracle Health
Sciences Applications. This vulnerability is remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE HEALTH SCIENCES APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Oracle Life Sciences
Data Hub OpenSSL SSL Yes 8.2 Network Low None None Un- changed Low None High 2.x
 

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Oracle Life Sciences
Data Hub OpenSSL SSL Yes 8.2 Network Low None None Un- changed Low None High 2.x
 

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2109, and CVE-2099-1234.


APPENDIX - ORACLE HOSPITALITY APPLICATIONS

ORACLE HOSPITALITY APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 3 new security fixes for Oracle Hospitality
Applications. None of these vulnerabilities may be remotely exploitable without
authentication, i.e., none may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

ORACLE HOSPITALITY APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5563 Oracle Hospitality OPERA
5 Property Services OPERA File Upload Download HTTP No 7.9 Network High High
None Changed High High Low 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0
  CVE-2016-5565 Oracle Hospitality OPERA 5 Property Services OPERA Xchange
Interface (OXI) HTTP No 7.7 Network Low Low None Changed High None None 5.4.0.0,
5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0   CVE-2016-5564 Oracle Hospitality
OPERA 5 Property Services OPERA Application Login HTTP No 7.4 Network Low Low
None Changed Low Low Low 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5563 Oracle Hospitality OPERA
5 Property Services OPERA File Upload Download HTTP No 7.9 Network High High
None Changed High High Low 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0
  CVE-2016-5565 Oracle Hospitality OPERA 5 Property Services OPERA Xchange
Interface (OXI) HTTP No 7.7 Network Low Low None Changed High None None 5.4.0.0,
5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0   CVE-2016-5564 Oracle Hospitality
OPERA 5 Property Services OPERA Application Login HTTP No 7.4 Network Low Low
None Changed Low Low Low 5.4.0.0, 5.4.1.0, 5.4.2.0, 5.4.3.0, 5.5.0.0, 5.5.1.0  


APPENDIX - ORACLE INSURANCE APPLICATIONS

ORACLE INSURANCE APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 1 new security fix for Oracle Insurance
Applications. This vulnerability is not remotely exploitable without
authentication, i.e., may not be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE INSURANCE APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Oracle Insurance IStream
Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed High
High High 4.3.2  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-7501 Oracle Insurance IStream
Apache Commons Collections HTTP No 8.8 Network Low Low None Un- changed High
High High 4.3.2  


APPENDIX - ORACLE RETAIL APPLICATIONS

ORACLE RETAIL APPLICATIONS EXECUTIVE SUMMARY

This Critical Patch Update contains 10 new security fixes for Oracle Retail
Applications. 5 of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE RETAIL APPLICATIONS RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Retail Customer
Insights Security HTTP Yes 9.8 Network Low None None Un- changed High High High
15.0   CVE-2015-3253 Oracle Retail Merchandising Insights Security HTTP Yes 9.8
Network Low None None Un- changed High High High 15.0   CVE-2015-7501 MICROS XBR
Liferay HTTP No 8.8 Network Low Low None Un- changed High High High 7.0.2, 7.0.4
  CVE-2015-7501 Oracle Retail Clearance Optimization Engine General Application
HTTP No 8.8 Network Low Low None Un- changed High High High 13.2, 13.3, 13.4,
14.0   CVE-2015-7501 Oracle Retail Xstore Point of Service Xenvironment HTTP No
8.8 Network Low Low None Un- changed High High High 5.0, 5.5, 6.0, 6.5, 7.0, 7.1
  CVE-2016-1881 Oracle Retail Back Office Security HTTP Yes 8.3 Network Low None
None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-1881 Oracle Retail Central Office Security HTTP Yes 8.3 Network Low
None None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-1881 Oracle Retail Returns Management Security HTTP Yes 8.3 Network Low
None None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-5539 Oracle Retail Xstore Payment Security HTTP No 7.3 Physical Low Low
None Changed High High Low 1.x   CVE-2016-5540 Oracle Retail Xstore Payment
Security HTTP No 6.7 Physical High Low None Changed High High None 1.x  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2015-3253 Oracle Retail Customer
Insights Security HTTP Yes 9.8 Network Low None None Un- changed High High High
15.0   CVE-2015-3253 Oracle Retail Merchandising Insights Security HTTP Yes 9.8
Network Low None None Un- changed High High High 15.0   CVE-2015-7501 MICROS XBR
Liferay HTTP No 8.8 Network Low Low None Un- changed High High High 7.0.2, 7.0.4
  CVE-2015-7501 Oracle Retail Clearance Optimization Engine General Application
HTTP No 8.8 Network Low Low None Un- changed High High High 13.2, 13.3, 13.4,
14.0   CVE-2015-7501 Oracle Retail Xstore Point of Service Xenvironment HTTP No
8.8 Network Low Low None Un- changed High High High 5.0, 5.5, 6.0, 6.5, 7.0, 7.1
  CVE-2016-1881 Oracle Retail Back Office Security HTTP Yes 8.3 Network Low None
None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-1881 Oracle Retail Central Office Security HTTP Yes 8.3 Network Low
None None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-1881 Oracle Retail Returns Management Security HTTP Yes 8.3 Network Low
None None Changed Low Low Low 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, 14.1  
CVE-2016-5539 Oracle Retail Xstore Payment Security HTTP No 7.3 Physical Low Low
None Changed High High Low 1.x   CVE-2016-5540 Oracle Retail Xstore Payment
Security HTTP No 6.7 Physical High Low None Changed High High None 1.x  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2015-7501 also addresses CVE-2015-4852.
 * The fix for CVE-2016-1881 also addresses CVE-2012-1007, CVE-2014-0114,
   CVE-2016-1181, and CVE-2016-1182.


APPENDIX - ORACLE PRIMAVERA PRODUCTS SUITE

ORACLE PRIMAVERA PRODUCTS SUITE EXECUTIVE SUMMARY

This Critical Patch Update contains 2 new security fixes for the Oracle
Primavera Products Suite. 1 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

ORACLE PRIMAVERA PRODUCTS SUITE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Primavera P6
Professional Project Management OpenSSL HTTP Yes 8.2 Network Low None None Un-
changed Low None High 8.3, 8.4, 15.x, 16.x   CVE-2016-5533 Primavera P6
Enterprise Project Portfolio Management Team Member HTTP No 5.4 Network Low Low
None Un- changed Low Low None 8.4, 15.x, 16.x  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-2107 Primavera P6
Professional Project Management OpenSSL HTTP Yes 8.2 Network Low None None Un-
changed Low None High 8.3, 8.4, 15.x, 16.x   CVE-2016-5533 Primavera P6
Enterprise Project Portfolio Management Team Member HTTP No 5.4 Network Low Low
None Un- changed Low Low None 8.4, 15.x, 16.x  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106,
   CVE-2016-2109, and CVE-2016-2176.


APPENDIX - ORACLE JAVA SE

ORACLE JAVA SE EXECUTIVE SUMMARY

This Critical Patch Update contains 7 new security fixes for Oracle Java SE. All
of these vulnerabilities may be remotely exploitable without authentication,
i.e., may be exploited over a network without requiring user credentials. The
English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start
application has administrator privileges (typical on Windows). When the user
does not run with administrator privileges (typical on Solaris and Linux), the
corresponding CVSS impact scores for Confidentiality, Integrity, and
Availability are "Low" instead of "High", lowering the CVSS Base Score. For
example, a Base Score of 9.6 becomes 7.1.

Users should only use the default Java Plug-in and Java Web Start from the
latest JDK or JRE 8 releases.

ORACLE JAVA SE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5556 Java SE 2D Multiple Yes
9.6 Network Low None Required Changed High High High Java SE: 6u121, 7u111,
8u102 See Note 1 CVE-2016-5568 Java SE AWT Multiple Yes 9.6 Network Low None
Required Changed High High High Java SE: 6u121, 7u111, 8u102 See Note 1
CVE-2016-5582 Java SE, Java SE Embedded Hotspot Multiple Yes 9.6 Network Low
None Required Changed High High High Java SE: 6u121, 7u111, 8u102; Java SE
Embedded: 8u101 See Note 1 CVE-2016-5573 Java SE, Java SE Embedded Hotspot
Multiple Yes 8.3 Network High None Required Changed High High High Java SE:
6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1 CVE-2016-5597 Java SE,
Java SE Embedded Networking Multiple Yes 5.9 Network High None None Un- changed
High None None Java SE: 6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1
CVE-2016-5554 Java SE, Java SE Embedded JMX Multiple Yes 4.3 Network Low None
Required Un- changed None Low None Java SE: 6u121, 7u111, 8u102; Java SE
Embedded: 8u101 See Note 1 CVE-2016-5542 Java SE, Java SE Embedded Libraries
Multiple Yes 3.1 Network High None Required Un- changed None Low None Java SE:
6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5556 Java SE 2D Multiple Yes
9.6 Network Low None Required Changed High High High Java SE: 6u121, 7u111,
8u102 See Note 1 CVE-2016-5568 Java SE AWT Multiple Yes 9.6 Network Low None
Required Changed High High High Java SE: 6u121, 7u111, 8u102 See Note 1
CVE-2016-5582 Java SE, Java SE Embedded Hotspot Multiple Yes 9.6 Network Low
None Required Changed High High High Java SE: 6u121, 7u111, 8u102; Java SE
Embedded: 8u101 See Note 1 CVE-2016-5573 Java SE, Java SE Embedded Hotspot
Multiple Yes 8.3 Network High None Required Changed High High High Java SE:
6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1 CVE-2016-5597 Java SE,
Java SE Embedded Networking Multiple Yes 5.9 Network High None None Un- changed
High None None Java SE: 6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1
CVE-2016-5554 Java SE, Java SE Embedded JMX Multiple Yes 4.3 Network Low None
Required Un- changed None Low None Java SE: 6u121, 7u111, 8u102; Java SE
Embedded: 8u101 See Note 1 CVE-2016-5542 Java SE, Java SE Embedded Libraries
Multiple Yes 3.1 Network High None Required Un- changed None Low None Java SE:
6u121, 7u111, 8u102; Java SE Embedded: 8u101 See Note 1

NOTES:

 1. This vulnerability applies to Java deployments, typically in clients running
    sandboxed Java Web Start applications or sandboxed Java applets, that load
    and run untrusted code (e.g., code that comes from the internet) and rely on
    the Java sandbox for security. This vulnerability does not apply to Java
    deployments, typically in servers, that load and run only trusted code
    (e.g., code installed by an administrator).


APPENDIX - ORACLE SUN SYSTEMS PRODUCTS SUITE

ORACLE SUN SYSTEMS PRODUCTS SUITE EXECUTIVE SUMMARY

This Critical Patch Update contains 16 new security fixes for the Oracle Sun
Systems Products Suite. 3 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without requiring
user credentials. The English text form of this Risk Matrix can be found here.

ORACLE SUN SYSTEMS PRODUCTS SUITE RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5503 Sun ZFS Storage
Appliance Kit (AK) Core Services None No 8.2 Local Low High None Changed High
High High AK 2013   CVE-2016-5544 Solaris Kernel/X86 None No 7.8 Local Low Low
None Un- changed High High High 10, 11.3   CVE-2016-5492 Sun ZFS Storage
Appliance Kit (AK) SMB Users None No 7.1 Local Low Low None Un- changed High
High None AK 2013 See Note 1 CVE-2016-5606 Solaris Kernel Zones None No 6.1
Local Low Low None Un- changed None Low High 11.3   CVE-2016-5576 Solaris Kernel
Zones None No 5.5 Local Low Low None Un- changed None None High 11.3  
CVE-2016-5486 Sun ZFS Storage Appliance Kit (AK) Core Services None No 5.5 Local
Low Low None Un- changed High None None AK 2013   CVE-2016-5566 Solaris
Installation HTTP Yes 5.3 Network Low None None Un- changed Low None None 11.3  
CVE-2016-5487 Solaris Files None No 5.3 Local Low Low None Un- changed Low Low
Low 11.3   CVE-2016-5553 Solaris Filesystem None No 5.0 Local Low Low Required
Un- changed None None High 10, 11.3   CVE-2016-5559 Solaris Kernel None No 4.1
Local High High None Un- changed None High None 10, 11.3   CVE-2016-5481 Sun ZFS
Storage Appliance Kit (AK) Core Services DNS Yes 3.7 Network High None None Un-
changed Low None None AK 2013   CVE-2016-5615 Solaris Lynx None No 3.3 Local Low
Low None Un- changed None None Low 11.3   CVE-2016-5508 Solaris Cluster Cluster
Geo None No 3.3 Local Low Low None Un- changed Low None None 4.3   CVE-2016-5525
Solaris Cluster Cluster check files None No 3.3 Local Low Low None Un- changed
None Low None 3.3, 4.3   CVE-2016-5561 Solaris IKE IKEv2 Yes 3.1 Network High
None Required Un- changed None None Low 11.3   CVE-2016-5480 Solaris Bash None
No 2.8 Local Low Low Required Un- changed None Low None 10  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5503 Sun ZFS Storage
Appliance Kit (AK) Core Services None No 8.2 Local Low High None Changed High
High High AK 2013   CVE-2016-5544 Solaris Kernel/X86 None No 7.8 Local Low Low
None Un- changed High High High 10, 11.3   CVE-2016-5492 Sun ZFS Storage
Appliance Kit (AK) SMB Users None No 7.1 Local Low Low None Un- changed High
High None AK 2013 See Note 1 CVE-2016-5606 Solaris Kernel Zones None No 6.1
Local Low Low None Un- changed None Low High 11.3   CVE-2016-5576 Solaris Kernel
Zones None No 5.5 Local Low Low None Un- changed None None High 11.3  
CVE-2016-5486 Sun ZFS Storage Appliance Kit (AK) Core Services None No 5.5 Local
Low Low None Un- changed High None None AK 2013   CVE-2016-5566 Solaris
Installation HTTP Yes 5.3 Network Low None None Un- changed Low None None 11.3  
CVE-2016-5487 Solaris Files None No 5.3 Local Low Low None Un- changed Low Low
Low 11.3   CVE-2016-5553 Solaris Filesystem None No 5.0 Local Low Low Required
Un- changed None None High 10, 11.3   CVE-2016-5559 Solaris Kernel None No 4.1
Local High High None Un- changed None High None 10, 11.3   CVE-2016-5481 Sun ZFS
Storage Appliance Kit (AK) Core Services DNS Yes 3.7 Network High None None Un-
changed Low None None AK 2013   CVE-2016-5615 Solaris Lynx None No 3.3 Local Low
Low None Un- changed None None Low 11.3   CVE-2016-5508 Solaris Cluster Cluster
Geo None No 3.3 Local Low Low None Un- changed Low None None 4.3   CVE-2016-5525
Solaris Cluster Cluster check files None No 3.3 Local Low Low None Un- changed
None Low None 3.3, 4.3   CVE-2016-5561 Solaris IKE IKEv2 Yes 3.1 Network High
None Required Un- changed None None Low 11.3   CVE-2016-5480 Solaris Bash None
No 2.8 Local Low Low Required Un- changed None Low None 10  

NOTES:

 1. This vulnerability applies to local users (i.e. users in /etc/passwd) and
    not applicable to other (e.g. LDAP) users.


APPENDIX - ORACLE LINUX AND VIRTUALIZATION

ORACLE VIRTUALIZATION EXECUTIVE SUMMARY

This Critical Patch Update contains 13 new security fixes for Oracle
Virtualization. 4 of these vulnerabilities may be remotely exploitable without
authentication, i.e., may be exploited over a network without requiring user
credentials. The English text form of this Risk Matrix can be found here.

ORACLE VIRTUALIZATION RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5580 Secure Global Desktop
Web Services Multiple No 9.6 Network Low Low None Changed High None High 4.7,
5.2   CVE-2016-5605 Oracle VM VirtualBox VirtualBox Remote Desktop Extension
(VRDE) VRDP Yes 9.1 Network Low None None Un- changed High High None VirtualBox
prior to 5.1.4   CVE-2016-0714 Virtual Desktop Infrastructure Apache Tomcat HTTP
No 8.8 Network Low Low None Un- changed High High High VDI prior to 3.5.3  
CVE-2015-7501 Virtual Desktop Infrastructure Apache Commons Collection Multiple
No 8.8 Network Low Low None Un- changed High High High VDI prior to 3.5.3  
CVE-2016-2107 Sun Ray Operating Software OpenSSL SSL/TLS Yes 8.2 Network Low
None None Un- changed Low None High SROS prior to 11.1.7   CVE-2016-5501 Oracle
VM VirtualBox Core None No 7.8 Local High Low None Changed High High High
VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2016-6304 Oracle VM VirtualBox
OpenSSL SSL/TLS Yes 7.5 Network Low None None Un- changed None None High
VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2015-7940 Virtual Desktop
Infrastructure Bouncy Castle Java Multiple Yes 7.5 Network Low None None Un-
changed High None None VDI prior to 3.5.3   CVE-2016-5610 Oracle VM VirtualBox
Core None No 6.8 Local Low None None Changed Low Low Low VirtualBox prior to
5.0.28, prior to 5.1.8   CVE-2016-5538 Oracle VM VirtualBox Core None No 6.7
Local Low High None Un-changed High High High VirtualBox prior to 5.0.28,
prior to 5.1.8   CVE-2016-5608 Oracle VM VirtualBox Core None No 5.5 Local Low
Low None Un- changed None None High VirtualBox prior to 5.0.28, prior to 5.1.8  
CVE-2016-5611 Oracle VM VirtualBox Core None No 4.3 Local Low None None Changed
Low None None VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2016-5613 Oracle
VM VirtualBox Core None No 4.3 Local Low None None Changed None None Low
VirtualBox prior to 5.0.28, prior to 5.1.8  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-5580 Secure Global Desktop
Web Services Multiple No 9.6 Network Low Low None Changed High None High 4.7,
5.2   CVE-2016-5605 Oracle VM VirtualBox VirtualBox Remote Desktop Extension
(VRDE) VRDP Yes 9.1 Network Low None None Un- changed High High None VirtualBox
prior to 5.1.4   CVE-2016-0714 Virtual Desktop Infrastructure Apache Tomcat HTTP
No 8.8 Network Low Low None Un- changed High High High VDI prior to 3.5.3  
CVE-2015-7501 Virtual Desktop Infrastructure Apache Commons Collection Multiple
No 8.8 Network Low Low None Un- changed High High High VDI prior to 3.5.3  
CVE-2016-2107 Sun Ray Operating Software OpenSSL SSL/TLS Yes 8.2 Network Low
None None Un- changed Low None High SROS prior to 11.1.7   CVE-2016-5501 Oracle
VM VirtualBox Core None No 7.8 Local High Low None Changed High High High
VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2016-6304 Oracle VM VirtualBox
OpenSSL SSL/TLS Yes 7.5 Network Low None None Un- changed None None High
VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2015-7940 Virtual Desktop
Infrastructure Bouncy Castle Java Multiple Yes 7.5 Network Low None None Un-
changed High None None VDI prior to 3.5.3   CVE-2016-5610 Oracle VM VirtualBox
Core None No 6.8 Local Low None None Changed Low Low Low VirtualBox prior to
5.0.28, prior to 5.1.8   CVE-2016-5538 Oracle VM VirtualBox Core None No 6.7
Local Low High None Un-changed High High High VirtualBox prior to 5.0.28,
prior to 5.1.8   CVE-2016-5608 Oracle VM VirtualBox Core None No 5.5 Local Low
Low None Un- changed None None High VirtualBox prior to 5.0.28, prior to 5.1.8  
CVE-2016-5611 Oracle VM VirtualBox Core None No 4.3 Local Low None None Changed
Low None None VirtualBox prior to 5.0.28, prior to 5.1.8   CVE-2016-5613 Oracle
VM VirtualBox Core None No 4.3 Local Low None None Changed None None Low
VirtualBox prior to 5.0.28, prior to 5.1.8  

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706, and
   CVE-2016-0763.
 * The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106, and
   CVE-2016-2109.
 * The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178,
   CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183,
   CVE-2016-6302, CVE-2016-6303, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307,
   CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.


APPENDIX - ORACLE MYSQL

ORACLE MYSQL EXECUTIVE SUMMARY

This Critical Patch Update contains 31 new security fixes for Oracle MySQL. 2 of
these vulnerabilities may be remotely exploitable without authentication, i.e.,
may be exploited over a network without requiring user credentials. The English
text form of this Risk Matrix can be found here.

ORACLE MYSQL RISK MATRIX

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-6304 MySQL Server Server:
Security: Encryption MySQL Protocol Yes 7.5 Network Low None None Un- changed
None None High 5.6.33 and earlier, 5.7.15 and earlier   CVE-2016-6662 MySQL
Server Server: Logging None No 7.2 Local High High Required Changed High High
High 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and earlier   CVE-2016-5617
MySQL Server Server: Error Handling None No 7.0 Local High Low None Un- changed
High High High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier  
CVE-2016-5616 MySQL Server Server: MyISAM None No 7.0 Local High Low None Un-
changed High High High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and
earlier   CVE-2016-5625 MySQL Server Server: Packaging None No 7.0 Local High
Low None Un- changed High High High 5.7.14 and earlier   CVE-2016-5609 MySQL
Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed None
None High 5.6.31 and earlier 5.7.13 and earlier   CVE-2016-5612 MySQL Server
Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed None None
High 5.5.50 and earlier, 5.6.31 and earlier, 5.7.13 and earlier   CVE-2016-5624
MySQL Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed
None None High 5.5.51 and earlier   CVE-2016-5626 MySQL Server Server: GIS MySQL
Protocol No 6.5 Network Low Low None Un- changed None None High 5.5.51 and
earlier, 5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5627 MySQL Server
Server: InnoDB MySQL Protocol No 6.5 Network Low Low None Un- changed None None
High 5.6.31 and earlier, 5.7.13 and earlier   CVE-2016-3492 MySQL Server Server:
Optimizer MySQL Protocol No 6.5 Network Low Low None Un- changed None None High
5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5598 MySQL
Connector Connector/Python MySQL Protocol Yes 5.6 Network High None None Un-
changed Low Low Low 2.1.3 and earlier, 2.0.4 and earlier   CVE-2016-7440 MySQL
Server Server: Security: Encryption None No 5.1 Local High None None Un- changed
High None None 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and earlier  
CVE-2016-5628 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5629 MySQL Server
Server: Federated MySQL Protocol No 4.9 Network Low High None Un- changed None
None High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier  
CVE-2016-3495 MySQL Server Server: InnoDB MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5630 MySQL Server
Server: InnoDB MySQL Protocol No 4.9 Network Low High None Un- changed None None
High 5.6.31 and earlier 5.7.13 and earlier   CVE-2016-5507 MySQL Server Server:
InnoDB MySQL Protocol No 4.9 Network Low High None Un- changed None None High
5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5631 MySQL Server Server:
Memcached MySQL Protocol No 4.9 Network Low High None Un- changed None None High
5.7.13 and earlier   CVE-2016-5632 MySQL Server Server: Optimizer MySQL Protocol
No 4.9 Network Low High None Un- changed None None High 5.7.14 and earlier  
CVE-2016-5633 MySQL Server Server: Performance Schema MySQL Protocol No 4.9
Network Low High None Un- changed None None High 5.7.13 and earlier  
CVE-2016-5634 MySQL Server Server: RBR MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5635 MySQL Server
Server: Security: Audit MySQL Protocol No 4.9 Network Low High None Un- changed
None None High 5.7.13 and earlier   CVE-2016-8289 MySQL Server Server: InnoDB
None No 4.7 Local High High None Un- changed None Low High 5.7.13 and earlier  
CVE-2016-8287 MySQL Server Server: Replication MySQL Protocol No 4.5 Network Low
High Required Un- changed None None High 5.7.13 and earlier   CVE-2016-8290
MySQL Server Server: Performance Schema MySQL Protocol No 4.4 Network High High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5584 MySQL Server
Server: Security: Encryption MySQL Protocol No 4.4 Network High High None Un-
changed High None None 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and
earlier   CVE-2016-8283 MySQL Server Server: Types MySQL Protocol No 4.3 Network
Low Low None Un- changed None None Low 5.5.51 and earlier, 5.6.32 and earlier,
5.7.14 and earlier   CVE-2016-8288 MySQL Server Server: InnoDB Plugin MySQL
Protocol No 3.1 Network High Low None Un- changed None Low None 5.6.30 and
earlier, 5.7.12 and earlier   CVE-2016-8286 MySQL Server Server: Security:
Privileges MySQL Protocol No 3.1 Network High Low None Un- changed Low None None
5.7.14 and earlier   CVE-2016-8284 MySQL Server Server: Replication None No 1.8
Local High High Required Un- changed None None Low 5.6.31 and earlier, 5.7.13
and earlier  

CVE# Component Sub­component Protocol Remote Exploit without Auth.? CVSS VERSION
3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base
Score Attack Vector Attack Complex Privs Req'd User Interact Scope
Confid­entiality Inte­grity Avail­ability CVE-2016-6304 MySQL Server Server:
Security: Encryption MySQL Protocol Yes 7.5 Network Low None None Un- changed
None None High 5.6.33 and earlier, 5.7.15 and earlier   CVE-2016-6662 MySQL
Server Server: Logging None No 7.2 Local High High Required Changed High High
High 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and earlier   CVE-2016-5617
MySQL Server Server: Error Handling None No 7.0 Local High Low None Un- changed
High High High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier  
CVE-2016-5616 MySQL Server Server: MyISAM None No 7.0 Local High Low None Un-
changed High High High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and
earlier   CVE-2016-5625 MySQL Server Server: Packaging None No 7.0 Local High
Low None Un- changed High High High 5.7.14 and earlier   CVE-2016-5609 MySQL
Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed None
None High 5.6.31 and earlier 5.7.13 and earlier   CVE-2016-5612 MySQL Server
Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed None None
High 5.5.50 and earlier, 5.6.31 and earlier, 5.7.13 and earlier   CVE-2016-5624
MySQL Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed
None None High 5.5.51 and earlier   CVE-2016-5626 MySQL Server Server: GIS MySQL
Protocol No 6.5 Network Low Low None Un- changed None None High 5.5.51 and
earlier, 5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5627 MySQL Server
Server: InnoDB MySQL Protocol No 6.5 Network Low Low None Un- changed None None
High 5.6.31 and earlier, 5.7.13 and earlier   CVE-2016-3492 MySQL Server Server:
Optimizer MySQL Protocol No 6.5 Network Low Low None Un- changed None None High
5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5598 MySQL
Connector Connector/Python MySQL Protocol Yes 5.6 Network High None None Un-
changed Low Low Low 2.1.3 and earlier, 2.0.4 and earlier   CVE-2016-7440 MySQL
Server Server: Security: Encryption None No 5.1 Local High None None Un- changed
High None None 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and earlier  
CVE-2016-5628 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5629 MySQL Server
Server: Federated MySQL Protocol No 4.9 Network Low High None Un- changed None
None High 5.5.51 and earlier, 5.6.32 and earlier, 5.7.14 and earlier  
CVE-2016-3495 MySQL Server Server: InnoDB MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5630 MySQL Server
Server: InnoDB MySQL Protocol No 4.9 Network Low High None Un- changed None None
High 5.6.31 and earlier 5.7.13 and earlier   CVE-2016-5507 MySQL Server Server:
InnoDB MySQL Protocol No 4.9 Network Low High None Un- changed None None High
5.6.32 and earlier, 5.7.14 and earlier   CVE-2016-5631 MySQL Server Server:
Memcached MySQL Protocol No 4.9 Network Low High None Un- changed None None High
5.7.13 and earlier   CVE-2016-5632 MySQL Server Server: Optimizer MySQL Protocol
No 4.9 Network Low High None Un- changed None None High 5.7.14 and earlier  
CVE-2016-5633 MySQL Server Server: Performance Schema MySQL Protocol No 4.9
Network Low High None Un- changed None None High 5.7.13 and earlier  
CVE-2016-5634 MySQL Server Server: RBR MySQL Protocol No 4.9 Network Low High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5635 MySQL Server
Server: Security: Audit MySQL Protocol No 4.9 Network Low High None Un- changed
None None High 5.7.13 and earlier   CVE-2016-8289 MySQL Server Server: InnoDB
None No 4.7 Local High High None Un- changed None Low High 5.7.13 and earlier  
CVE-2016-8287 MySQL Server Server: Replication MySQL Protocol No 4.5 Network Low
High Required Un- changed None None High 5.7.13 and earlier   CVE-2016-8290
MySQL Server Server: Performance Schema MySQL Protocol No 4.4 Network High High
None Un- changed None None High 5.7.13 and earlier   CVE-2016-5584 MySQL Server
Server: Security: Encryption MySQL Protocol No 4.4 Network High High None Un-
changed High None None 5.5.52 and earlier, 5.6.33 and earlier, 5.7.15 and
earlier   CVE-2016-8283 MySQL Server Server: Types MySQL Protocol No 4.3 Network
Low Low None Un- changed None None Low 5.5.51 and earlier, 5.6.32 and earlier,
5.7.14 and earlier   CVE-2016-8288 MySQL Server Server: InnoDB Plugin MySQL
Protocol No 3.1 Network High Low None Un- changed None Low None 5.6.30 and
earlier, 5.7.12 and earlier   CVE-2016-8286 MySQL Server Server: Security:
Privileges MySQL Protocol No 3.1 Network High Low None Un- changed Low None None
5.7.14 and earlier   CVE-2016-8284 MySQL Server Server: Replication None No 1.8
Local High High Required Un- changed None None Low 5.6.31 and earlier, 5.7.13
and earlier  

NOTES:

 1. CVE-2016-5616 is equivalent to CVE-2016-6663, and CVE-2016-5617 is
    equivalent to CVE-2016-6664.

ADDITIONAL CVES ADDRESSED:

 * The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178,
   CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183,
   CVE-2016-6302, CVE-2016-6303, and CVE-2016-6306.

RESOURCES FOR

 * Careers
 * Developers
 * Investors
 * Partners
 * Researchers
 * Students and Educators

WHY ORACLE

 * Analyst Reports
 * Best cloud-based ERP
 * Cloud Economics
 * Social Impact
 * Culture and Inclusion
 * Security Practices

LEARN

 * What is cloud computing?
 * What is CRM?
 * What is Docker?
 * What is Kubernetes?
 * What is Python?
 * What is SaaS?

NEWS AND EVENTS

 * News
 * Oracle CloudWorld
 * Oracle CloudWorld Tour
 * Oracle Health Summit
 * Oracle DevLive
 * Search all events

CONTACT US

 * DE Sales +49 6103 397 003
 * US Sales: +1.800.633.0738
 * How can we help?
 * Subscribe to emails
 * Integrity Helpline
 * Accessibility

--------------------------------------------------------------------------------

 * 
 * © 2024 Oracle
 * Privacy/Do Not Sell My Info
 * Cookie-Einstellungen
 * Ad Choices
 * Careers

 * 
 * 
 * 
 *