Note: This page is part of the archive.

This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact if you have any questions about the US-CERT website archive.

Alert (TA05-292A)

Oracle Products Contain Multiple Vulnerabilities

Systems Affected

  • Oracle Database Server 10g
  • Oracle9i Database Server
  • Oracle8i Database Server
  • Oracle8 Database Server
  • Oracle Enterprise Manager 10g Grid Control
  • Oracle Enterprise Manager Application Server Control
  • Oracle Enterprise Manager 10g Database Control
  • Oracle Application Server 10g
  • Oracle9i Application Server
  • Oracle Collaboration Suite 10g
  • Oracle9i Collaboration Suite
  • Oracle E-Business Suite Release 11i
  • Oracle E-Business Suite Release 11.0
  • Oracle Clinical
  • JD Edwards EnterpriseOne, OneWorld XE
  • Oracle Developer Suite
  • Oracle Workflow

For more information regarding affected product versions, please see the Oracle Critical Patch Update - October 2005.


Various Oracle products and components are affected by multiple vulnerabilities. The impacts of these vulnerabilities include unauthenticated, remote code execution, information disclosure, and denial of service.


Oracle released a Critical Patch Update in October 2005. It addresses more than eighty vulnerabilities in different Oracle products and components.

The Critical Patch Update provides information about affected components, access and authorization required, and the impact of the vulnerabilities on data confidentiality, integrity, and availability. For more information on terms used in the Critical Patch Update, Metalink customers should refer to MetaLink Note 293956.1.

According to the Critical Patch Update: "The new database vulnerabilities addressed by this Critical Patch Update do not affect Oracle Database Client-only installations (installations that do not have the Oracle Database Server installed). Therefore, it is not necessary to apply this Critical Patch Update to client-only installations if a prior Critical Patch Update, or Alert 68, has already been applied to the client-only installations."

US-CERT recommends that sites running Oracle review the Critical Patch Update, apply patches, and take other mitigating action as appropriate. US-CERT is tracking all of these issues under VU#210524. As further information becomes available, we will publish individual Vulnerability Notes.

Note that according to public reports, the patches included in this update, as well as previous updates, may not adequately correct all security vulnerabilities.


The impact of these vulnerabilities varies depending on the product, component, and configuration of the system. Potential consequences include remote execution of arbitrary code or commands, information disclosure, and denial of service. An attacker who compromises an Oracle database may be able to gain access to sensitive information.


Apply a patch

Apply the appropriate patches or upgrade as specified in the Oracle Critical Patch Update - October 2005. Note that this Critical Patch Update only lists newly corrected issues. Updates to patches for previously known issues are not listed.


It may be possible to mitigate some vulnerabilities by disabling or removing unnecessary components, restricting network access, and restricting access to temporary files.

Oracle Critical Patch Update - October 2005 suggests disabling the PSQL Manager to mitigate a vulnerability in PeopleSoft Enterprise PeopleTools (PSE04).

Appendix A. Vendor Information


Please see Oracle Critical Patch Update - October 2005 and Critical Patch Updates and Security Alerts.

Appendix B. References

  • Critical Patch Update - October 2005 ->
  • Critical Patch Updates and Security Alerts ->
  • MetaLink Note 293956.1 ->
  • US-CERT Vulnerability Note VU#210524 ->
  • US-CERT Vulnerability Notes Related to Critical Patch Update - October 2005 ->
  • Map of Public Vulnerability to Advisory/Alert ->
  • SecurityFocus BugTraq ->

Information used in this document came from Oracle.

Oracle credits Brian Carr; Sacha Faust of S.P.I. Dynamics, Inc.; Esteban Martínez Fayó of Application Security, Inc.; Alexander Kornbrust of Red Database Security; Steven Kost of Integrigy Corporation; David Litchfield of NGSS Limited; noderat ratty, Keigo Yamazaki of Little eArth Corporation Co., Ltd.

Feedback can be directed to US-CERT Technical Staff.

Produced by US-CERT, a government organization. Terms of use

Revision History

  • October 19, 2005: Initial release

    Last updated

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No