Published on: 21 July 2016
Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.
There are 13 vulnerabilities identified in Java affecting multiple sub-components including CORBA, Deployment, Hotspot, Install, JavaFX, JAXP, Libraries and Networking. All of them could be remotely exploited without authentication in which 3 of them could affect server deployment of Java (e.g. through a web service).
For vulnerabilities identified in those Oracle products, they can be remotely exploited through various protocols including HTTP, HTTPS, IPMI, MySQL Protocol, NTP, Oracle Net, SNMP, SSH, SSL/TLS, T3, TLS, UDP and X11 over a network.
There are multiple attack vectors. For Java, an attacker could entice a user to open a specially crafted web page containing un-trusted Java applet or Java Web Start application with malicious content, or to launch executables using the Java launcher. For other Oracle products, a remote attacker could send specially crafted network packets to the affected system to exploit the vulnerabilities.
Oracle Java SE
Database Server
Oracle Linux and Virtualization
Oracle MySQL Product Suite
Fusion Applications and Middleware
E-Business Suite
Enterprise Manager
Health Sciences
JD Edwards
Oracle Banking Platform
Oracle Communications Applications
Oracle Financial Services Applications
Oracle Insurance Applications
Oracle Knowledge Applications
Oracle Policy Automation
Oracle Primavera Products Suite
Oracle Supply Chain Products
Oracle Utilities Applications
Oracle and Sun Systems Products Suite
PeopleSoft
Retail Applications
Siebel CRM
Depending on the vulnerability exploited, a successful attack could lead to arbitrary code execution, denial of services, information disclosure, bypass of security restrictions or compromise of a vulnerable system.
Patches for affected systems are available. Users of the affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
For Oracle Java SE products, please refer to the following link:
For other Oracle products, please refer to the section "Patch Availability Table and Risk Matrices" of corresponding security advisory at the vendor’s website:
Users may contact their product support vendors for the fixes and assistance.
This link will open in a new windowhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
This link will open in a new windowhttp://www.oracle.com/technetwork/java/javase/8u101-relnotes-3021761.html
This link will open in a new windowhttp://www.oracle.com/technetwork/java/javase/8u102-relnotes-3021767.html
This link will open in a new windowhttps://www.hkcert.org/my_url/en/alert/16072001
This link will open in a new windowhttps://www.us-cert.gov/ncas/current-activity/2016/07/19/Oracle-Releases-Security-Bulletin
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3137
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9708
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3253
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0635
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1181
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3081
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3424
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3432
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3433
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3440
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3444 (to CVE-2016-3446)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3448
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3450 (to CVE-2016-3453)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458 (to CVE-2016-3459)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3467 (to CVE-2016-3472)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3474 (to CVE-2016-3491)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3493 (to CVE-2016-3494)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3496 (to CVE-2016-3504)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3506 (to CVE-2016-3550)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3552 (to CVE-2016-3561)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3563 (to CVE-2016-3598)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606 (to CVE-2016-3615)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5436 (to CVE-2016-5437)
This link will open in a new windowhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5439 (to CVE-2016-5477)