Security Alert (A19-04-05): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2019)
17 April 2019
Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.
There are 5 vulnerabilities identified in Java affecting multiple sub-components including 2D, Libraries, RMI and Windows DLL. All of them could be remotely exploited without authentication.
For vulnerabilities identified in other Oracle products, they can be exploited by physical access or remotely through various protocols including HTTP, HTTPS, JDBC, JDENET, Local Logon, MySQL Protocol, Oracle Net, SSH, T3, TCP or TLS over a network.
There are multiple attack vectors. For Java, an attacker could entice a user to open a specially crafted web page containing un-trusted Java applet or Java Web Start application with malicious content or to submit specially crafted data to APIs in the specified Component through a web service. For other Oracle products, a remote attacker could send specially crafted network packets to the affected systems to exploit the vulnerabilities.
Oracle Java SE
Oracle Linux and Virtualization
Oracle MySQL Product Suite
Oracle and Sun Systems Products Suite
Fusion Applications and Middleware
Oracle Support Tools
A complete list of the affected products can be found at: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Depending on the vulnerability exploited, a successful attack could lead to denial of services, data tampering, information disclosure or compromise of a vulnerable system.
Patches for affected systems are available. Users of the affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
For Oracle Java SE products, please refer to the following link:
Java Platform SE 8u211, 8u212 (JDK and JRE),
Java Platform SE 11.0.3 (JDK and JRE)
Java Platform SE 12.0.1 (JDK and JRE) http://www.oracle.com/technetwork/java/javase/downloads/index.html
For other Oracle products, please refer to the section "Patch Availability Table and Risk Matrices" of corresponding security advisory at the vendor’s website: https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Users may contact their product support vendors for the fixes and assistance.