Oracle Security Alert for CVE-2014-7169
Oracle Security Alert for CVE-2014-7169
Description
This Security Alert addresses multiple publicly disclosed vulnerabilities affecting GNU Bash, specifically CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278. GNU Bash is a popular open source command line shell incorporated into Linux and other widely used operating systems. These vulnerabilities affect multiple Oracle products. These vulnerabilities may be remotely exploitable without authentication, i.e. may be exploited over a network without the need for a username and password. A remote user can exploit these vulnerabilities to execute arbitrary code on systems that are running affected versions of Bash.
For this document, the vulnerabilities listed above will be referred to collectively as CVE-2014-7169.
Oracle is investigating and will provide fixes for affected products as soon as they have been fully tested and determined to provide effective mitigation against these vulnerabilities.
Due to the severity, public disclosure, and reports of active exploitation of CVE-2014-7169 and the related vulnerabilities, Oracle strongly recommends that customers apply the fixes provided by this Security Alert as soon as they are released by Oracle.Affected Products and Versions
Please refer to Bash Vulnerabilities - CVE-2014-7169 for a list of Oracle products and versions that are affected by these vulnerabilities. That page will be updated when new information becomes available.
Patch Availability
Patch availability information related to these vulnerabilities can be found on the Bash Vulnerabilities - CVE-2014-7169 page. Note that in some instances, the instructions on this page or references from this page may include important steps to take before and after the application of the relevant patch.
Supported Products and Versions
Patch availability information is provided only for product versions that are covered under the Premier Support or Extended Support phases of the . We recommend that customers remain on actively supported versions to ensure that they continue to receive security fixes from Oracle.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of the vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities.
Products in Extended Support
Security Alert fixes are available to customers who have purchased Extended Support under the . Customers must have a valid Extended Support service contract to apply Security Alert fixes for products in the Extended Support Phase.
References
- Oracle Critical Patch Updates and Security Alerts main page [ Oracle Technology Network ]
- Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions [ CPU FAQ ]
- Risk Matrix definitions [ Risk Matrix Definitions ]
- Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS Scoring ]
- English text version of risk matrix [ Oracle Technology Network ]
- CVRF XML version of the risk matrix [ Oracle Technology Network ]
Modification History
Date | Comments |
---|---|
2014-September-26 | Rev 1. Initial Release |
2014-September-27 | Rev 2. Fixes available for Exalogic |
2014-September-28 | Rev 3. Tables modified for products affected with and without fixes |
2014-September-29 | Rev 4. Detailed product information moved to Bash Vulnerabilities - CVE-2014-7169 |
Appendix - Oracle Sun Systems Products SuiteOracle Sun Systems Products Suite Executive SummaryThis Security Alert contains 1 new security fix for the Oracle Sun Systems Products Suite. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here. Oracle Sun Systems Products Suite Risk Matrix
Notes:
Appendix - Oracle Linux and VirtualizationOracle Linux Executive SummaryThis Security Alert contains 1 new security fix for Oracle Linux. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. The English text form of this Risk Matrix can be found here. Oracle Linux Risk Matrix
Notes:
|
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/20674423/viewspace-1286240/,如需轉載,請註明出處,否則將追究法律責任。
相關文章
- Oracle Security Alert for CVE-2014-0160Oracle
- oracle alert日誌Oracle
- Oracle SecurityOracle
- oracle alert日誌每天截斷truncate_alert.shOracle
- oracle audit and securityOracle
- 歸檔oracle alert日誌Oracle
- alert log on Oracle11gOracle
- Oracle11g_alert_logOracle
- oracle alert的定義指南Oracle
- Oracle Label SecurityOracle
- Oracle Advanced SecurityOracle
- oracle 外部表alert_orcl.oraOracle
- oracle系統包——dbms_alert用法Oracle
- [Shell] monitor oracle alert.log file and sendmailOracleAI
- oracle alert日誌亂碼處理Oracle
- Oracle_Label_Security[轉]Oracle
- 最佳實踐(保持、清理ORACLE alert日誌)Oracle
- 8.Monitor oracle alert.log file and sendmailOracleAI
- Oracle:/etc/security/limits.confOracleMIT
- Oracle Advanced Security Frequently Asked QuestionsOracle
- Oracle Doc list involved with securityOracle
- Oracle清理trace、alert、aud、listener.log檔案Oracle
- oracle清理trace、alert、aud、listener等日誌檔案Oracle
- oracle 11g檢視alert日誌方法Oracle
- oracle dbms_alert對指定事件發警報Oracle事件
- ORACLE 告警日誌alert過大的處理Oracle
- Queries to view Alert Log content And Alert LocationView
- JavaScript alert()JavaScript
- Types of Oracle Database Users : Security Officers (2)OracleDatabase
- [Shell] Monitor other host oracle instance alert.log and mailOracleAI
- Oracle 警告日誌 (alert log) 中包含哪些內容 ?Oracle
- 9.Monitor other host oracle instance alert.log and mailOracleAI
- 轉載-找出Oracle alert檔案中的ORA錯誤Oracle
- Oracle SQL92_SECURITY初始化引數OracleSQL
- 透過alert日誌看Oracle Startup的三個階段Oracle
- Oracle的告警日誌之v$diag_alert_ext檢視Oracle
- oracle 中 alert 報警日誌過大的處理方法Oracle
- 【alert】每週自動備份alert日誌檔案