VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-100113-001
Oracle 製品における複数の脆弱性に対するアップデート
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2010.html

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by those security patches. Critical Patch Updates are cumulative, except as noted below, but each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2010-01-13
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2010-01-13




脆弱性の影響を受ける製品の識別子
cpe:/a:oracle:application_server     (Oracle Application Server)
cpe:/a:oracle:database_server     (Oracle Database Server)
cpe:/a:oracle:e-business_suite     (Oracle E-Business Suite)
lapt:/a:oracle:oracle_access_manager     (Oracle Access Manager)
lapt:/a:oracle:oracle_jrockit     (Oracle JRockit)
lapt:/a:oracle:peoplesoft_enterprise_hcm     (PeopleSoft Enterprise HCM)
lapt:/a:oracle:primavera_p6_enterprise_project_portfolio_management     (Primavera P6 Enterprise Project Portfolio Management)
lapt:/a:oracle:primavera_p6_web_services     (Primavera P6 Web Services)
lapt:/a:oracle:weblogic_server     (Bea Weblogic Server)
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
X 同一セグメント上 [?]
インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

一般ユーザアカウント [?]
フリーアカウント [?]
X 不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

簡単 [?]
X 不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
X 公式パッチ有り [?]

公式回避策有り [?]
非公式回避策・パッチ有り [?]
なし [?]

[インシデントの発生状況] [?]
X 活動なし [?]

Exploit/PoCあり [?]
活動あり [?]

関連情報




参考情報
Common Vulnerabilities and Exposures (CVE) CVE-2010-0071




Common Vulnerabilities and Exposures (CVE) CVE-2009-3415




Common Vulnerabilities and Exposures (CVE) CVE-2010-0076




Common Vulnerabilities and Exposures (CVE) CVE-2009-3411




Common Vulnerabilities and Exposures (CVE) CVE-2009-3414




Common Vulnerabilities and Exposures (CVE) CVE-2009-1996




Common Vulnerabilities and Exposures (CVE) CVE-2009-3410




Common Vulnerabilities and Exposures (CVE) CVE-2009-3413




Common Vulnerabilities and Exposures (CVE) CVE-2009-3412




Common Vulnerabilities and Exposures (CVE) CVE-2010-0072




Common Vulnerabilities and Exposures (CVE) CVE-2010-0066




Common Vulnerabilities and Exposures (CVE) CVE-2010-0067




Common Vulnerabilities and Exposures (CVE) CVE-2010-0070




Common Vulnerabilities and Exposures (CVE) CVE-2010-0077




Common Vulnerabilities and Exposures (CVE) CVE-2010-0075




Common Vulnerabilities and Exposures (CVE) CVE-2009-3416




Common Vulnerabilities and Exposures (CVE) CVE-2010-0080




Common Vulnerabilities and Exposures (CVE) CVE-2010-0079




Common Vulnerabilities and Exposures (CVE) CVE-2010-0068




Common Vulnerabilities and Exposures (CVE) CVE-2010-0074




Common Vulnerabilities and Exposures (CVE) CVE-2010-0078




Common Vulnerabilities and Exposures (CVE) CVE-2010-0069




Common Vulnerabilities and Exposures (CVE) CVE-2009-2625
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java RuntimeEnvironment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE5.0 before Update 20, and in other products, allows remote attackersto cause a denial of service (infinite loop and application hang) viamalformed XML input, as demonstrated by the Codenomicon XML fuzzingframework.





Copyright © 2010 JPCERT/CC All Rights Reserved.