Oracle's 193-Bug Patch Includes Zero-Day Fix

Oracle this week released its latest quarterly Critical Patch Update (CPU) that includes fixes for 193 issues across the company's product line.

One of the Java vulnerabilities (CVE-2015-2590 ) was reportedly already being exploited in the wild, which might account for Oracle's strongly worded admonition in its announcement:

"Oracle continues to periodically receive reports of malicious exploitation of vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that malicious attackers have been successful because customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay." (Italics are Oracle's.)

CVE-2015-2590, which allowed remote attackers to affect confidentiality, integrity, and availability "via unknown vectors related to Libraries," was the first zero-day Java vulnerability to be reported in two years, according to security researchers at Trend Micro. The hacker group Pawn Storm (also known as APT28) had been using the zero-day exploit to target "certain armed forces of a NATO country and a U.S. defense organization," the researchers found. The hacker group is believed to be Russian.

Twenty-three of the Java vulnerabilities are remotely exploitable without authentication, explained Eric P. Maurice, director of Oracle's Software Security Assurance group, in an Oracle Security blog post. Sixteen of the Java SE fixes are for Java client-only; one is for the client installation of Java SE; and five are for client and server deployment.

This CPU also includes a fix specifically for the Mac platform, and four for the Java Secure Socket Extension (JSSE) client and server deployments.

Seven of the 25 Java vulnerabilities addressed in this CPU earned a CVSS rating of 10.0 -- very serious. Oracle uses the Common Vulnerability Scoring System (CVSS) to provide an open and standardized rating of the security holes it finds in its products. This CPU relied on the 2.0 version of that rating system, but version 3.0 is now available and will likely be used in the next quarterly update. The Forum of Incident Response and Security Teams (FIRST) announced the availability of CVSS 3.0 in June. The latest version has been under development for three years.

John Matthew Holt, CTO of Dublin-based Java security vendor Waratek, pointed out in an e-mail that, of the 25 CVEs fixed in this patch, 24 of them (96 percent) affect Java SE 8, the latest and most up-to-date Java version -- revealing, he said, that the security of Java's APIs has not significantly improved over time. He also noted that Java SE 7 is no longer being provided with public security updates. "So enterprises running Java SE 7 applications -- which is virtually every large enterprise today -- cannot automatically download and apply these important security fixes," he said.

With this CPU Oracle also provided patches for its other products, including Oracle Database, Oracle Fusion Middleware, Oracle Hyperion, Oracle Enterprise Manager, Oracle E-Business Suite, Oracle Supply Chain Suite, Oracle PeopleSoft Enterprise, Oracle Siebel CRM, Oracle Communications Applications, Oracle Java SE, Oracle Sun Systems Products Suite, Oracle Linux and Virtualization, and Oracle MySQL.

About the Author

John has been covering the high-tech beat from Silicon Valley and the San Francisco Bay Area for nearly two decades. He serves as Editor-at-Large for Application Development Trends ( and contributes regularly to Redmond Magazine, The Technology Horizons in Education Journal, and Campus Technology. He is the author of more than a dozen books, including The Everything Guide to Social Media; The Everything Computer Book; Blobitecture: Waveform Architecture and Digital Design; John Chambers and the Cisco Way; and Diablo: The Official Strategy Guide.


  • How To Ransomware-Proof Your Backups: 4 Key Best Practices

    Backups are the only guaranteed way to save your data after a ransomware attack. Here's how to make sure your backup strategy has ransomware mitigation built right in.

  • Microsoft Buys Mover To Aid Microsoft 365 Shifts

    Microsoft announced on Monday that it bought Mover to help organizations migrate data and shift to using Microsoft 365 services.

  • Microsoft Explains Windows 7 Extended Security Updates Setup Process

    Microsoft this week described installation instructions for volume licensing users of Windows 7 Service Pack 1 to get Extended Security Updates (ESU) activated on PCs.

  • Microsoft Azure Active Directory Outage Blocks Access for 2.5 Hours

    Issues affecting the Azure Active Directory service blocked customers from accessing applications early on the morning of Oct. 18 for about 2.5 hours.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.