Oracle Critical Patch Update Advisory - April 2017

Description

A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:

Critical Patch Updates and Security Alerts for information about Oracle Security Advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.

This Critical Patch Update contains 300 new security fixes across the product families listed below. Please note that a MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2017 Critical Patch Update: Executive Summary and Analysis.

Please note that the vulnerabilities in this Critical Patch Update are scored using version 3.0 of Common Vulnerability Scoring Standard (CVSS).

This Critical Patch Update advisory is also available in an XML format that conforms to the Common Vulnerability Reporting Format (CVRF) version 1.1. More information about Oracle's use of CVRF is available here.

Affected Products and Components

Security vulnerabilities addressed by this Critical Patch Update affect the products listed in the categories below. The product area of the patches for the listed versions is shown in the Patch Availability column corresponding to the specified Affected Products and Versions column. Please click on the link in the Patch Availability column below to access the documentation for patch availability information and installation instructions.

For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2017 Documentation Map, My Oracle Support Note.

The list of affected product releases and versions that are in Premier Support or Extended Support, under the Oracle Lifetime Support Policy is as follows:

Note:

Vulnerabilities affecting Oracle Database and Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document, My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.

Users running Java SE with a browser can download the latest release from http://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.

Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security fixes required to resolve ZFSSA issues published in Critical Patch Updates (CPUs) and Solaris Third Party bulletins.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.0).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. Until you apply the CPU fixes, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security fixes as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security fixes announced in this CPU, please review previous Critical Patch Update advisories to determine appropriate actions.

Product Dependencies

Oracle products may have dependencies on other Oracle products. Hence security vulnerability fixes announced in this Critical Patch Update may affect one or more dependent Oracle products. For details regarding these dependencies and how to apply patches to dependent products, please refer to Patch Set Update and Critical Patch Update April 2017 Availability Document, My Oracle Support Note 2228898.1.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Supported Database, Fusion Middleware, Oracle Enterprise Manager Base Platform (formerly "Oracle Enterprise Manager Grid Control") and Collaboration Suite products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Products in Extended Support

Patches released through the Critical Patch Update program are available to customers who have Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to download patches released through the Critical Patch Update program for products in the Extended Support Phase.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

Abhishek Nandawat: CVE-2017-3495

Akshay Jain: CVE-2017-3499

Alexey Tyurin of ERPScan: CVE-2017-3555, CVE-2017-3556

An Anonymous researcher via Beyond Security's SecuriTeam Secure Disclosure Program: CVE-2017-3533

Andrea Micalizzi aka rgod, working with Trend Micro's Zero Day Initiative: CVE-2017-3230

Andrew Gill of Pentest Limited: CVE-2017-3528

Arun Babu of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517

Binoy Koonammavu of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517

Can Demirel and Faruk Unal of Biznet Bilisim A.S: CVE-2017-3621

Deniz Cevik of Biznet Bilisim A.S.: CVE-2017-3625

Devin Rosenbauer of Identity Works LLC: CVE-2017-3506, CVE-2017-3553

Dmitrii Iudin aka @ret5et: CVE-2017-3547

Dmitry Chastuhin of ERPScan: CVE-2017-3549

Emiliano J. Fausto of Onapsis: CVE-2017-3550

Florian Bogner: CVE-2017-3511

Gaston Traberg of Onapsis: CVE-2017-3337, CVE-2017-3393, CVE-2017-3432

Hanno Böck: CVE-2017-3604, CVE-2017-3605, CVE-2017-3606, CVE-2017-3607, CVE-2017-3608, CVE-2017-3609, CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615, CVE-2017-3616

Ivan Chalykin of ERPScan: CVE-2017-3555, CVE-2017-3556, CVE-2017-3557

Jacob Baines of Tenable Network Security: CVE-2017-3531

Jakub Palaczynski of ING Services Polska: CVE-2017-3528

James Forshaw: CVE-2017-3563

Jann Horn: CVE-2017-3538, CVE-2017-3558, CVE-2017-3561, CVE-2017-3575, CVE-2017-3576

Jason Bertman: CVE-2017-3545, CVE-2017-3554, CVE-2017-3591

John S Andersen of Intel: CVE-2017-3513

Jussi of CERT-FI: CVE-2017-3540

Khajornchol Puwarang of Mindterra Red Team: CVE-2017-3520

Kyle Stiemann of Liferay: CVE-2017-3626

Li Qiang of the Qihoo 360 Gear Team: CVE-2017-3559

Lionel Debroux: CVE-2017-3604, CVE-2017-3605, CVE-2017-3606, CVE-2017-3607, CVE-2017-3608, CVE-2017-3609, CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615, CVE-2017-3616, CVE-2017-3617

loopx9: CVE-2017-3506

Manich Koomsusi of Mindterra Red Team: CVE-2017-3520

Marcin Zięba of Prevenity: CVE-2017-3507

Mateusz Jurczyk of Google Project Zero: CVE-2017-3587

Matias Mevied of Onapsis: CVE-2017-3337, CVE-2017-3393, CVE-2017-3432

Mickey Shkatov of Intel: CVE-2017-3513

Mohammed Saty of PricewaterhouseCoopers: CVE-2017-3254

Moritz Bechler: CVE-2017-3509

Nada Alnoaimi of Saudi Aramco: CVE-2017-3501

Nadezhda Krivdyuk of ERPScan: CVE-2017-3548

Or Hanuka of Motorola Solutions: CVE-2017-3579, CVE-2017-3583

Peter Kostiuk of Salesforce.com: CVE-2017-3232, CVE-2017-3233, CVE-2017-3234, CVE-2017-3237, CVE-2017-3504, CVE-2017-3505, CVE-2017-3581, CVE-2017-3618, CVE-2017-3619, CVE-2017-3620

Thijs Alkemade of Computest: CVE-2017-3523

Renjith TC of ValueMentor Infosec Pvt. Ltd: CVE-2017-3517

Rodrigo Marcos of Secforce: CVE-2017-3599

Roman Shalymov of ERPScan: CVE-2017-3546, CVE-2017-3547

Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.: CVE-2017-3593, CVE-2017-3594, CVE-2017-3595, CVE-2017-3596, CVE-2017-3597, CVE-2017-3598, CVE-2017-3602, CVE-2017-3603

Tawatchai Pinsuwan of Mindterra Red Team: CVE-2017-3520

Teemu Kääriäinen (Nixu): CVE-2017-3540, CVE-2017-3542, CVE-2017-3543

Tzachy Horesh of Motorola Solutions: CVE-2017-3579, CVE-2017-3583

Ubais PK of EY Global Delivery Services: CVE-2017-3534, CVE-2017-3535

William Roberts of Intel: CVE-2017-3513

Zuozhi Fan formerly of Alibaba: CVE-2017-3309, CVE-2017-3331, CVE-2017-3453, CVE-2017-3456, CVE-2017-3463

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update Advisory, Oracle recognizes Alexey Tyurin of ERPScan; David Litchfield formerly of Google; Eric Gruber of Netspi; Ivan Chalykin of ERPScan; Jeffrey Walton; Khai Tran formerly of Netspi; MMakhil; Roman Shalymov of ERPScan (2 reports); Suraj Khetani of Gulf Business Machines; and Xiejingwei Fei of FINRA for contributions to Oracle's Security-In-Depth program.

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.

For this quarter, Oracle recognizes Adam Willard of Blue Canopy (2 reports); Cédric Bühler; Daniël van Eeden; Hamdi Charfeddine of Tunisian WhiteHat Security; Harsh Joshi of Infomenia Technologies; Jasmin Landry; Jhayz Rubio; Mala; Mat Werber of Amazon Web Services IT Security; Mazlum Bozan; Md. Nur A Alam Dipu; Mohammed Khalid Almouty; Muhammad nurnobi of Serverghosts; Muhammad Uwais; Sreedeep.Ck Alavil of Kerala Police Cyber Dome Volunteers Commander; Suleman Malik; Sumit Sahoo (54H00); Suvadip Kar; and Tansel Çetin for contributions to Oracle's On-Line Presence Security program.

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

18 July 2017

17 October 2017

16 January 2018

17 April 2018

References

Modification History

Date Note 2017-June-20 Rev 5. Updated CVSS score for CVE-2017-3337, CVE-2017-3393, CVE-2017-3432, ﻿CVE-2017-3515, ﻿CVE-2017-3528, CVE-2017-3550, ﻿CVE-2017-3556 and CVE-2017-3557. 2017-May-18 Rev 4. Updated affected versions for CVE-2012-0920, CVE-2013-5209, CVE-2015-0204 and CVE-2016-6304. 2017-May-02 Rev 3. Updated affected releases for CVE-2017-3305. Updated "Credit Statement" section. 2017-April-21 Rev 2. Added CVE-2017-3523. Added note for CVE-2017-3600. Updated "On-Line Presence Security Contributors" section. 2017-April-18 Rev 1. Initial Release.

Appendix - Oracle Database Server

Oracle Database Server Executive Summary

This Critical Patch Update contains 3 new security fixes for the Oracle Database Server divided as follows:

2 new security fixes for the Oracle Database Server. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. 1 of these fixes is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Database Server Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3486 SQL*Plus Local Logon Oracle Net No 7.2 Local High High Required Changed High High High 11.2.0.4, 12.1.0.2 See Note 1 CVE-2017-3567 OJVM Create Session, Create Procedure Multiple No 5.3 Network High Low None Un- changed None None High 11.2.0.4, 12.1.0.2

Notes:

This score is for Windows platform version 11.2.0.4 of Database. For Windows platform version 12.1.0.2 and Linux, the score is 6.3 with scope Unchanged.

Oracle Database Server Client-Only Installations

The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2017-3486.

Oracle Secure Backup Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Secure Backup Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2016-6290 PHP None Multiple Yes 9.8 Network Low None None Un- changed High High High Prior to 12.1.0.3.0

Additional CVEs addressed are below:

The fix for CVE-2016-6290 also addresses CVE-2016-6288, CVE-2016-6289, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, and CVE-2016-6297.

Appendix - Oracle Berkeley DB

Oracle Berkeley DB Executive Summary

This Critical Patch Update contains 14 new security fixes for Oracle Berkeley DB. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Berkeley DB Risk Matrix

CVE# Component Package and/or Privilege Required Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3604 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3605 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3606 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3607 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3608 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3609 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3610 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3611 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3612 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3613 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3614 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3615 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3616 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32 CVE-2017-3617 Data Store None None No 7.0 Local High None Required Un- changed High High High Prior to 6.2.32

Appendix - Oracle Fusion Middleware

Oracle Fusion Middleware Executive Summary

This Critical Patch Update contains 31 new security fixes for Oracle Fusion Middleware. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security fixes are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Fusion Middleware Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 Oracle WebCenter Sites Third Party Tools (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3553 Oracle Identity Manager Rules Engine HTTP No 9.9 Network Low Low None Changed High High High 11.1.2.3.0 CVE-2016-6303 Oracle API Gateway Oracle API Gateway (OpenSSL) HTTPS Yes 9.8 Network Low None None Un- changed High High High 11.1.2.4.0 CVE-2015-7501 Oracle Fusion Middleware MapViewer Install (Apache Commons Collections) HTTP Yes 9.8 Network Low None None Un- changed High High High 11.1.1.9, 12.2.1.1, 12.2.1.2 CVE-2017-5638 Oracle WebLogic Server Samples (Struts 2) HTTP Yes 9.8 Network Low None None Un- changed High High High 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2 CVE-2016-0714 Oracle WebCenter Sites Apache Tomcat HTTP No 8.8 Network Low Low None Un- changed High High High 11.1.1.8.0 CVE-2015-7501 Oracle WebCenter Sites Sites (Apache Commons Collections) HTTP No 8.8 Network Low Low None Un- changed High High High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3230 Oracle Fusion Middleware MapViewer Map Builder HTTP Yes 8.6 Network Low None None Un- changed Low High Low 11.1.1.9, 12.2.1.1, 12.2.1.2 CVE-2017-3540 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un- changed Low Low High 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3542 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un- changed High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3543 Oracle WebCenter Sites Server HTTP Yes 8.6 Network Low None None Un- changed High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3625 Oracle WebCenter Content Content Server HTTP Yes 8.2 Network Low None Required Changed High Low None 11.1.1.7, 11.1.1.9, 12.2.1.0, 12.2.1.1, 12.2.1.2 CVE-2017-3545 Oracle WebCenter Sites Blob Server HTTP Yes 8.2 Network Low None None Un- changed Low High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3541 Oracle WebCenter Sites Server HTTP Yes 8.2 Network Low None None Un- changed High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3601 Oracle API Gateway Oracle API Gateway HTTP Yes 8.1 Network Low None Required Un- changed High High None 11.1.2.4.0 CVE-2017-3602 Oracle WebCenter Sites Advanced UI HTTP No 8.1 Network Low Low None Un- changed High High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3554 Oracle WebCenter Sites Catalog Mover HTTP No 8.1 Network Low Low None Un- changed High High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2016-1181 Oracle WebLogic Server Samples (Struts 1) HTTP Yes 8.1 Network High None None Un- changed High High High 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2 CVE-2017-3596 Oracle WebCenter Sites Advanced UI HTTP No 7.6 Network Low Low None Un- changed High Low Low 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3499 Oracle Social Network Android Client HTTPS Yes 7.5 Network Low None None Un- changed High None None prior to 11.1.12.0.0 (17019101) CVE-2017-3506 Oracle WebLogic Server Web Services HTTP Yes 7.4 Network High None None Un- changed High High None 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2 CVE-2017-3507 Oracle Service Bus Web Console Design HTTP Yes 7.3 Network Low None None Un- changed Low Low Low 12.1.3.0.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3531 Oracle WebLogic Server Servlet Runtime HTTP Yes 7.2 Network Low None None Changed None Low Low 12.1.3.0, 12.2.1.0, 12.2.1.1, 12.2.1.2 CVE-2017-3593 Oracle WebCenter Sites Advanced UI HTTP Yes 7.1 Network Low None Required Un- changed High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3595 Oracle WebCenter Sites Advanced UI HTTP No 7.1 Network Low Low None Un- changed High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3591 Oracle WebCenter Sites Catalog Mover HTTP Yes 7.1 Network Low None Required Un- changed Low High None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3594 Oracle WebCenter Sites Advanced UI HTTP No 5.9 Network High Low None Un- changed High Low None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3597 Oracle WebCenter Sites Advanced UI HTTP No 5.7 Network Low Low Required Un- changed High None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3626 Oracle GlassFish Server Java Server Faces Multiple Yes 3.1 Network High None Required Un- changed Low None None 3.1.2 CVE-2017-3598 Oracle WebCenter Sites Advanced UI HTTP No 3.1 Network High Low None Un- changed Low None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0 CVE-2017-3603 Oracle WebCenter Sites Advanced UI HTTP No 3.1 Network High Low None Un- changed Low None None 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0, 12.2.1.2.0

Additional CVEs addressed are below:

The fix for CVE-2016-0714 also addresses CVE-2015-5351, CVE-2016-0706, and CVE-2016-0763.

The fix for CVE-2016-1181 also addresses CVE-2012-1007, CVE-2014-0114, and CVE-2016-1182.

The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix - Oracle Hyperion

Oracle Hyperion Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Hyperion. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hyperion Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2015-3237 Oracle Hyperion Essbase Security (libcurl) HTTP Yes 6.5 Network Low None None Un- changed Low None Low 11.1.2.2

Additional CVEs addressed are below:

The fix for CVE-2015-3237 also addresses CVE-2015-3236.

Appendix - Oracle Enterprise Manager Grid Control

Oracle Enterprise Manager Grid Control Executive Summary

This Critical Patch Update contains 2 new security fixes for Oracle Enterprise Manager Grid Control. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these fixes are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager Grid Control installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2017 Patch Availability Document for Oracle Products, My Oracle Support Note 2228898.1.

Oracle Enterprise Manager Grid Control Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2016-3092 Enterprise Manager Base Platform Security Framework HTTP Yes 7.5 Network Low None None Un- changed None None High 12.1.0, 13.1.0, 13.2.0 CVE-2017-3518 Enterprise Manager Base Platform Discovery Framework HTTPS Yes 7.5 Network Low None None Un- changed None None High 12.1.0, 13.1.0, 13.2.0

Additional CVEs addressed are below:

The fix for CVE-2017-3518 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, and CVE-2016-7052.

Appendix - Oracle Applications

Oracle E-Business Suite Executive Summary

This Critical Patch Update contains 11 new security fixes for the Oracle E-Business Suite. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security fixes are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2017 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2017), My Oracle Support Note 2241313.1.

Some of the risk matrix rows in this section are assigned multiple CVE#s. In these cases, additional CVEs are listed below the risk matrix to improve readability. Each group of CVE identifiers share the same description, vulnerability type, Component, Sub-Component and affected versions listed in the risk matrix entry, but occur in different code sections within a Sub-Component.

Oracle E-Business Suite Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3549 Oracle Scripting Scripting Administration HTTP Yes 9.1 Network Low None None Un- changed High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3393 Oracle Advanced Outbound Telephony Interaction History HTTP Yes 8.2 Network Low None Required Changed High Low None 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3550 Oracle Customer Interaction History Admin Console HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3 CVE-2017-3337 Oracle Marketing User Interface HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3432 Oracle One-to-One Fulfillment Audience workbench HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.1, 12.1.2, 12.1.3 CVE-2017-3557 Oracle One-to-One Fulfillment Print Server HTTP Yes 8.2 Network Low None Required Changed High Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3555 Oracle iReceivables Self Registration HTTP Yes 7.5 Network Low None None Un- changed None None High 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3592 Oracle Payables Self Service Manager HTTP No 6.5 Network Low High None Un- changed High High None 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3528 Oracle Applications Framework Popup windows (lists of values, datepicker, etc.) HTTP Yes 4.7 Network Low None Required Changed None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3515 Oracle User Management User Name/Password Management HTTP Yes 4.7 Network Low None Required Changed None Low None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 CVE-2017-3556 Oracle Application Object Library File Management HTTP Yes 3.7 Network High None None Un- changed Low None None 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6

Additional CVEs addressed are below:

The fix for CVE-2017-3337 also addresses CVE-2017-3342, CVE-2017-3345, CVE-2017-3347, CVE-2017-3355, and CVE-2017-3356.

The fix for CVE-2017-3432 also addresses CVE-2017-3434.

Oracle Supply Chain Products Suite Executive Summary

This Critical Patch Update contains 1 new security fix for the Oracle Supply Chain Products Suite. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Supply Chain Products Suite Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3530 Oracle Transportation Manager Security HTTP No 6.1 Network Low High Required Un- changed High High None 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, 6.4.1, 6.4.2

Oracle PeopleSoft Products Executive Summary

This Critical Patch Update contains 16 new security fixes for Oracle PeopleSoft Products. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle PeopleSoft Products Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3519 PeopleSoft Enterprise PeopleTools Security HTTP Yes 7.5 Network Low None None Un- changed High None None 8.54, 8.55 CVE-2017-3547 PeopleSoft Enterprise PeopleTools MultiChannel Framework HTTP Yes 7.4 Network Low None Required Changed None High None 8.54, 8.55 CVE-2017-3577 PeopleSoft Enterprise CS Campus Community Frameworks HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3570 PeopleSoft Enterprise FSCM eSettlements HTTP No 6.5 Network Low High None Un- changed High High None 9.1 CVE-2017-3520 PeopleSoft Enterprise PeopleTools Fluid Core HTTP Yes 6.5 Network Low None Required Un- changed None High None 8.54, 8.55 CVE-2017-3548 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 6.5 Network Low None None Un- changed Low None Low 8.54, 8.55 CVE-2017-3546 PeopleSoft Enterprise PeopleTools MultiChannel Framework HTTP Yes 6.5 Network Low None None Un- changed Low Low None 8.54, 8.55 CVE-2014-3596 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 6.5 Network Low None None Un- changed Low Low None 8.54, 8.55 CVE-2017-3521 PeopleSoft Enterprise SCM Purchasing Supplier Registration HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3525 PeopleSoft Enterprise SCM Service Procurement Usability HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3524 PeopleSoft Enterprise SCM Strategic Sourcing Bidder Registration HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3571 PeopleSoft Enterprise SCM eBill Payment Security HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3522 PeopleSoft Enterprise SCM eSupplier Connection Vendor HTTP No 6.5 Network Low High None Un- changed High High None 9.2 CVE-2017-3502 PeopleSoft Enterprise FIN Receivables Receivables HTTP Yes 5.3 Network Low None None Un- changed None Low None 9.2 CVE-2017-3527 PeopleSoft Enterprise PeopleTools Fluid Core HTTP Yes 5.3 Network Low None None Un- changed Low None None 8.54, 8.55 CVE-2017-3536 PeopleSoft Enterprise PeopleTools Security HTTP No 4.6 Network Low Low Required Un- changed Low Low None 8.54, 8.55

Oracle JD Edwards Products Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle JD Edwards Products. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle JD Edwards Products Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3517 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.5 Network Low None None Un- changed Low None Low 9.2

Oracle Siebel CRM Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Siebel CRM. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Siebel CRM Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 Siebel Apps - E-Billing Security (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1, 6.2, 7.0, 7.1

Oracle Commerce Executive Summary

This Critical Patch Update contains 3 new security fixes for Oracle Commerce. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Commerce Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3572 Oracle Commerce Guided Search / Oracle Commerce Experience Manager MDEX HTTP Yes 7.5 Network Low None None Un- changed None None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2 CVE-2016-6304 Oracle Commerce Guided Search / Oracle Commerce Experience Manager MDEX HTTPS Yes 7.5 Network Low None None Un- changed None None High 6.2.2, 6.3.0, 6.4.1.2, 6.5.0, 6.5.1, 6.5.2 CVE-2016-2107 Oracle Commerce Guided Search / Oracle Commerce Experience Manager Platform Services HTTPS Yes 5.9 Network High None None Un- changed High None None 6.1.4, 11.0, 11.1, 11.2

Additional CVEs addressed are below:

The fix for CVE-2016-2107 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, and CVE-2016-2176.

The fix for CVE-2016-6304 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6306, CVE-2016-7052, CVE-2016-7055, CVE-2017-3731, and CVE-2017-3732.

Appendix - Oracle Communications Applications

Oracle Communications Applications Executive Summary

This Critical Patch Update contains 11 new security fixes for Oracle Communications Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Communications Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 Oracle Communications Policy Management Security (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 12.2 CVE-2016-0729 Oracle Communications ASAP Security (Xerces) HTTP Yes 9.8 Network Low None None Un- changed High High High 7.0, 7.2, 7.3 CVE-2016-0635 Oracle Communications Network Integrity Security (Spring) HTTP No 8.8 Network Low Low None Un- changed High High High 7.3.0, 7.2.4 CVE-2016-3092 Oracle Communications Service Broker Engineered System Edition Install (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un- changed None None High 6.0, 6.1 CVE-2013-5209 Oracle Communications Session Border Controller Sysadmin (SCTP) SCTP Yes 7.5 Network Low None None Un- changed High None None SCZ7.2.0, SCZ7.3.0, SCZ7.4.0 CVE-2016-6304 Oracle Communications Session Border Controller Routing (OpenSSL) TLS Yes 7.5 Network Low None None Un- changed None None High SCZ7.2.0, SCZ7.3.0, SCZ7.4.0 CVE-2012-0920 Oracle Communications Session Border Controller Sysadmin (Dropbear) SSH No 7.1 Network High Low Required Un- changed High High High SCZ7.2.0, SCZ7.3.0, SCZ7.4.0 CVE-2017-3732 Oracle Communications Security Gateway Routing (OpenSSL) TLS Yes 5.9 Network High None None Un- changed High None None 3.0.0 CVE-2013-2566 Oracle Communications Session Border Controller Sysadmin SSH Yes 5.9 Network High None None Un- changed High None None SCZ7.3.0, SCZ7.4.0 CVE-2017-3470 Oracle Communications Security Gateway Network ICMP Ping Yes 5.3 Network Low None None Un- changed None None Low 3.0.0 CVE-2015-0204 Oracle Communications Session Border Controller Routing TLS Yes 5.3 Network Low None None Un- changed None Low None SCZ7.2.0, SCZ7.3.0, SCZ7.4.0

Additional CVEs addressed are below:

The fix for CVE-2016-6304 also addresses CVE-2014-3571, CVE-2015-0286, CVE-2015-1791, CVE-2015-3195, and CVE-2016-2107.

The fix for CVE-2017-3732 also addresses CVE-2014-3571, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, and CVE-2015-1792.

Appendix - Oracle Financial Services Applications

Oracle Financial Services Applications Executive Summary

This Critical Patch Update contains 47 new security fixes for Oracle Financial Services Applications. 25 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Financial Services Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 Oracle FLEXCUBE Private Banking Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 12.0.1, 12.0.2, 12.0.3, 12.1.0 CVE-2017-5638 Oracle Financial Services Analytical Applications Infrastructure Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 7.3.3, 7.3.4, 7.3.5 CVE-2017-5638 Oracle Financial Services Asset Liability Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Basel Regulatory Capital Basic Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.2, 6.1.3, 8.0.2, 8.0.3 CVE-2017-5638 Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.2, 6.1.3, 8.0.2, 8.0.3 CVE-2017-5638 Oracle Financial Services Data Foundation Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Data Integration Hub Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Enterprise Financial Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4 CVE-2017-5638 Oracle Financial Services Funds Transfer Pricing Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Hedge Management and IFRS Valuations Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Institutional Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4 CVE-2017-5638 Oracle Financial Services Liquidity Risk Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.4 CVE-2017-5638 Oracle Financial Services Loan Loss Forecasting and Provisioning Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 1.5.0, 1.5.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Pricing Management/Transfer Pricing Component Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4 CVE-2017-5638 Oracle Financial Services Profitability Management Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 6.0.0, 6.1.0, 6.1.1, 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2017-5638 Oracle Financial Services Reconciliation Framework Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0, 8.0.1, 8.0.2 CVE-2017-5638 Oracle Financial Services Retail Customer Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.3 CVE-2017-5638 Oracle Financial Services Retail Performance Analytics Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.0 to 8.0.4 CVE-2017-5638 Oracle Insurance Data Foundation Core (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 8.0.1, 8.0.2, 8.0.3, 8.0.4 CVE-2016-0635 Oracle FLEXCUBE Private Banking Core (Spring Framework) HTTP No 8.8 Network Low Low None Un- changed High High High 12.0.1, 12.0.2, 12.0.3, 12.1.0 CVE-2017-3493 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP No 8.5 Network Low Low None Changed High None Low 12.0.0, 12.1.0 CVE-2017-3472 Oracle FLEXCUBE Private Banking Portfolio Management HTTP No 8.1 Network Low Low None Un- changed High High None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1 CVE-2017-3476 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 7.1 Network Low Low None Un- changed High Low None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1 CVE-2017-3485 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.8 Network High Low None Un- changed None High High 11.3.0, 11.4.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 CVE-2017-3491 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 6.5 Network Low Low None Un- changed High None None 12.0.1, 12.1.0 CVE-2017-3488 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 6.5 Network Low Low None Un- changed None High None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0 CVE-2017-3534 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.5 Network Low Low None Un- changed High None None 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0 CVE-2017-3496 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.0.0, 12.1.0 CVE-2017-3492 Oracle FLEXCUBE Enterprise Limits and Collateral Management Infrastructure HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.0, 12.1.0 CVE-2017-3484 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.0, 12.1.0 CVE-2017-3489 Oracle FLEXCUBE Investor Servicing Security Management System HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0 CVE-2017-3288 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0 CVE-2017-3478 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.4 Network Low Low None Un- changed Low Low None 12.0.0, 12.1.0 CVE-2017-3479 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.4 Network Low Low None Un- changed None Low Low 2.0.0, 2.0.1, 2.2.0.1, 12.0.1 CVE-2017-3482 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.4 Network Low Low Required Changed Low Low None 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0 CVE-2017-3475 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 5.0 Network Low Low None Changed None None Low 2.0.0, 2.0.1, 2.2.0.1, 12.0.1 CVE-2017-3495 Oracle FLEXCUBE Direct Banking Pre-Login HTTP Yes 4.7 Network Low None Required Changed Low None None 12.0.2, 12.0.3 CVE-2017-3471 Oracle FLEXCUBE Private Banking Miscellaneous HTTP Yes 4.7 Network Low None Required Changed None Low None 12.0.0, 12.1.0 CVE-2017-3480 Oracle FLEXCUBE Universal Banking Infrastructure HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1 CVE-2017-3535 Oracle FLEXCUBE Universal Banking Infrastructure HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3 CVE-2017-3494 Oracle FLEXCUBE Universal Banking Retail Teller HTTP Yes 4.7 Network Low None Required Changed Low None None 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3 CVE-2017-3483 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral None No 4.4 Local Low High None Un- changed High None None 12.0.0, 12.1.0 CVE-2017-3473 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.3 Network Low Low None Un- changed Low None None 2.0.0, 2.0.1, 2.2.0.1, 12.0.1 CVE-2017-3481 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 4.3 Network Low Low None Un- changed None None Low 11.3.0, 11.4.0, 12.0.1 CVE-2017-3477 Oracle FLEXCUBE Private Banking Miscellaneous HTTP No 4.2 Network High Low None Un- changed Low Low None 12.0.0, 12.1.0 CVE-2017-3490 Oracle FLEXCUBE Enterprise Limits and Collateral Management Limits and Collateral HTTP No 3.1 Network High Low None Un- changed Low None None 12.0.0, 12.1.0 CVE-2017-3487 Oracle FLEXCUBE Investor Servicing Unit Trust HTTP No 3.1 Network High Low None Un- changed None Low None 12.0.1, 12.0.2, 12.0.3, 12.0.4, 12.1.0, 12.2.0, 12.3.0

Appendix - Oracle Health Sciences Applications

Oracle Health Sciences Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Health Sciences Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Health Sciences Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2016-3092 Oracle Healthcare Master Person Index Cleanser, Profiler (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un- changed None None High Prior to and 2.0.1.x, 3.0.0.x and 4.0.1.x

Appendix - Oracle Hospitality Applications

Oracle Hospitality Applications Executive Summary

This Critical Patch Update contains 6 new security fixes for Oracle Hospitality Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Hospitality Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3574 Oracle Hospitality OPERA 5 Property Services OPERA License code configuration HTTP No 7.1 Network Low Low None Un- changed High Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x CVE-2017-3568 Oracle Hospitality OPERA 5 Property Services OPERA Printing and Login None No 6.5 Local High None Required Un- changed High High Low 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x CVE-2017-3573 Oracle Hospitality OPERA 5 Property Services OPERA Printing HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x CVE-2017-3569 Oracle Hospitality OPERA 5 Property Services OPERA Business Events HTTP No 5.4 Network Low Low None Un- changed Low Low None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x CVE-2017-3552 Oracle Hospitality OPERA 5 Property Services OPERA Room Image/Picture Setup HTTP No 4.3 Network Low Low None Un- changed Low None None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x CVE-2017-3560 Oracle Hospitality OPERA 5 Property Services OXI Interface HTTP No 4.3 Network Low Low None Un- changed Low None None 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x, 5.5.1.x

Appendix - Oracle Insurance Applications

Oracle Insurance Applications Executive Summary

This Critical Patch Update contains 1 new security fix for Oracle Insurance Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Insurance Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2015-7940 Oracle Insurance Istream IStream Publisher (Bouncy Castle) HTTP No 6.5 Network Low Low None Un- changed High None None 4.3.2 and prior

Appendix - Oracle Retail Applications

Oracle Retail Applications Executive Summary

This Critical Patch Update contains 39 new security fixes for Oracle Retail Applications. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Retail Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 Oracle Retail XBRi Loss Prevention Internal Operations (Struts 2) HTTP Yes 10.0 Network Low None None Changed High High High 10.0.1, 10.5.0, 10.6.0, 10.7.0, 10.8.0, 10.8.1 CVE-2016-0635 Oracle Retail Back Office Security HTTP No 8.8 Network Low Low None Un- changed High High High 14.1 CVE-2016-0635 Oracle Retail Invoice Matching Security HTTP No 8.8 Network Low Low None Un- changed High High High 13.2, 14.0, 14.1 CVE-2016-0635 Oracle Retail Point-of-Service Infrastructure HTTP No 8.8 Network Low Low None Un- changed High High High 14.1.3 CVE-2016-0635 Oracle Retail Point-of-Service Mobile POS HTTP No 8.8 Network Low Low None Un- changed High High High 14.1.3 CVE-2016-0635 Oracle Retail Returns Management Security HTTP No 8.8 Network Low Low None Un- changed High High High 14.1 CVE-2016-3506 MICROS Lucas Security Oracle Net Yes 8.1 Network High None None Un- changed High High High 2.9.5.1, 2.9.5.2, 2.9.5.3, 2.9.5.4, 2.9.5.5 CVE-2016-3506 MICROS Relate CRM Software Web Services Oracle Net Yes 8.1 Network High None None Un- changed High High High 10.0, 10.5, 10.8, 11.0, 11.1, 11.4, 15.0 CVE-2016-3506 MICROS XBR Database Oracle Net Yes 8.1 Network High None None Un- changed High High High 10.0.1, 10.5.0, 10.6.0, 10.7.7, 10.8.0, 10.8.1 CVE-2016-3506 MICROS Xstore Payment Security Oracle Net Yes 8.1 Network High None None Un- changed High High High 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0 CVE-2016-3506 Oracle Retail Advanced Inventory Planning Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1, 15.0 CVE-2016-3506 Oracle Retail Advanced Science Engine General Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1 CVE-2016-3506 Oracle Retail Analytic Parameter Calculator - RO Data Interface Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-3506 Oracle Retail Analytic Parameter Calculator - RO Installation/Configuration Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-3506 Oracle Retail Analytics Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.0, 14.1, 15.0, 16.0 CVE-2016-3506 Oracle Retail Assortment Planning Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.1, 16.0.0 CVE-2016-3506 Oracle Retail Category Management Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 13.2, 13.3, 14.0, 14.1 CVE-2016-3506 Oracle Retail Category Management Planning & Optimization Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-3506 Oracle Retail Customer Insights Installer Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-2510 Oracle Retail Customer Management and Segmentation Foundation Web Services HTTPS Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-3506 Oracle Retail Demand Forecasting Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Item Planning Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Macro Space Optimization Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0.2 CVE-2016-3506 Oracle Retail Merchandise Financial Planning Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Merchandising Insights Installer Oracle Net Yes 8.1 Network High None None Un- changed High High High 15.0 CVE-2016-3506 Oracle Retail Order Broker Order Broker Foundation Oracle Net Yes 8.1 Network High None None Un- changed High High High 5.1, 5.2, 15.0, 16.0 CVE-2016-3506 Oracle Retail Predictive Application Server Installer - Server Oracle Net Yes 8.1 Network High None None Un- changed High High High 13.1, 13.2, 13.3, 13.4, 14.0, 14.1, 15.0 CVE-2016-3506 Oracle Retail Regular Price Optimization Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Replenishment Optimization Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Size Profile Optimization Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1.3, 15.0.2 CVE-2016-3506 Oracle Retail Store Inventory Installation Oracle Net Yes 8.1 Network High None None Un- changed High High High 14.1, 15.0, 16.0 CVE-2016-3506 Oracle Retail Xstore Point of Service Point of Sale Oracle Net Yes 8.1 Network High None None Un- changed High High High 5.5, 6.0, 6.5, 7.1, 15.0 CVE-2016-3506 Oracle Retail Xstore Point of Service Point of Sale Oracle Net Yes 8.1 Network High None None Un- changed High High High 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, 16.0 CVE-2016-1181 Oracle Retail Invoice Matching Security None No 7.8 Local Low Low None Un- changed High High High 12.0, 13.0, 13.1, 13.2, 14.0, 14.1 CVE-2017-3254 Oracle Retail Invoice Matching Security HTTP Yes 7.6 Network Low None Required Un- changed High Low Low 12.0, 13.0 CVE-2015-7940 Oracle Retail Open Commerce Platform Framework HTTP Yes 7.5 Network Low None None Un- changed High None None 4.0, 5.0, 5.1, 5.3, 6.0 CVE-2015-0204 Oracle Retail Predictive Application Server RPAS Server SSL/TLS Yes 7.5 Network Low None None Un- changed None None High 13.3.3, 13.4.3, 14.0.3, 14.1.3, 15.0.2, 16.0.0 CVE-2017-3532 Oracle Retail Warehouse Management System Security HTTP Yes 6.1 Network Low None Required Changed Low Low None 13.2, 14.0, 15.0 CVE-2017-3451 Oracle Retail Open Commerce Platform Web HTTP No 5.4 Network Low Low Required Changed Low Low None 4.0, 5.0, 5.1, 5.3, 6.0, 6.1, 15.0, 16.0

Additional CVEs addressed are below:

The fix for CVE-2015-0204 also addresses CVE-2014-3571.

The fix for CVE-2016-1181 also addresses CVE-2014-0114, and CVE-2016-1182.

The fix for CVE-2017-5638 also addresses CVE-2016-4436.

Appendix - Oracle Utilities Applications

Oracle Utilities Applications Executive Summary

This Critical Patch Update contains 7 new security fixes for Oracle Utilities Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Utilities Applications Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2016-5019 Oracle Utilities Customer Self Service Packaging (Apache Trinidad) HTTP Yes 9.8 Network Low None None Un- changed High High High 2.1.0.2.0 CVE-2014-0114 Oracle Utilities Framework System Wide HTTP Yes 8.3 Network Low None None Changed Low Low Low 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0 CVE-2016-3092 Oracle Utilities Framework File Uploads and Attachments (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un- changed None None High 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0 CVE-2016-3674 Oracle Utilities Framework UI, Batch and XAI (Xstream) HTTP Yes 7.5 Network Low None None Un- changed High None None 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0 CVE-2016-3092 Oracle Utilities Work and Asset Management Integrations (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un- changed None None High 1.9.1.2.11 CVE-2017-3537 Oracle Real-Time Scheduler Mobile Communications Platform HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.2.0.3.13, 2.3.0.0, 2.3.0.1 CVE-2012-5881 Oracle Utilities Framework UI (YUI JavaScript framework) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.2.0.0.0, 4.1.0.1.0, 4.1.0.2.0, 4.2.0.1.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0, 4.3.0.2.0, 4.3.0.3.0

Additional CVEs addressed are below:

The fix for CVE-2012-5881 also addresses CVE-2012-5882, and CVE-2012-5883.

Appendix - Oracle Primavera Products Suite

Oracle Primavera Products Suite Executive Summary

This Critical Patch Update contains 7 new security fixes for the Oracle Primavera Products Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Primavera Products Suite Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3503 Primavera P6 Enterprise Project Portfolio Management Web Access (Apache Commons BeanUtils) HTTP No 9.9 Network Low Low None Changed High High High 8.3, 8.4, 15.1, 15.2, 16.1, 16.2 CVE-2017-3508 Primavera Gateway Primavera Desktop Integration HTTP No 9.1 Network Low High None Changed High High High 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2 CVE-2017-3500 Primavera Gateway Primavera Desktop Integration HTTP No 8.7 Network Low High None Changed High None High 1.0, 1.1, 14.2, 15.1, 15.2, 16.1, 16.2 CVE-2017-3583 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP Yes 8.1 Network Low None Required Un- changed High High None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2 CVE-2017-3579 Primavera P6 Enterprise Project Portfolio Management Web Access HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2 CVE-2017-3501 Primavera Unifier Platform HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.13, 9.14, 10.0, 10.1, 15.1, 15.2 CVE-2017-3732 Primavera P6 Enterprise Project Portfolio Management Project Manager (OpenSSL) HTTPS Yes 5.9 Network High None None Un- changed High None None 8.3, 8.4, 15.1, 15.2, 16.1, 16.2

Additional CVEs addressed are below:

The fix for CVE-2017-3503 also addresses CVE-2014-0114.

Appendix - Oracle Java SE

Oracle Java SE Executive Summary

This Critical Patch Update contains 8 new security fixes for Oracle Java SE. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.

Users should only use the default Java Plug-in and Java Web Start from the latest JDK or JRE 8 releases.

Oracle Java SE Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3512 Java SE AWT Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 7u131, 8u121 See Note 1 CVE-2017-3514 Java SE AWT Multiple Yes 8.3 Network High None Required Changed High High High Java SE: 6u141, 7u131, 8u121 See Note 1 CVE-2017-3511 Java SE, Java SE Embedded, JRockit JCE None No 7.7 Local High None Required Changed High High High Java SE: 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2 CVE-2017-3526 Java SE, Java SE Embedded, JRockit JAXP Multiple Yes 5.9 Network High None None Un- changed None None High Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2 CVE-2017-3509 Java SE, Java SE Embedded Networking Multiple Yes 4.2 Network High None Required Un- changed Low Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121 See Note 1 CVE-2017-3533 Java SE, Java SE Embedded, JRockit Networking FTP Yes 3.7 Network High None None Un- changed None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2 CVE-2017-3544 Java SE, Java SE Embedded, JRockit Networking SMTP Yes 3.7 Network High None None Un- changed None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 See Note 2 CVE-2017-3539 Java SE, Java SE Embedded Security Multiple Yes 3.1 Network High None Required Un- changed None Low None Java SE: 6u141, 7u131, 8u121; Java SE Embedded: 8u121 See Note 1

Notes:

This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

Appendix - Oracle Sun Systems Products Suite

Oracle Sun Systems Products Suite Executive Summary

This Critical Patch Update contains 21 new security fixes for the Oracle Sun Systems Products Suite. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Sun Systems Products Suite Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3623 Solaris Kernel RPC Multiple Yes 10.0 Network Low None None Changed High High High None See Note 1 CVE-2016-3607 Solaris Cluster GlassFish Server Multiple Yes 9.8 Network Low None None Un- changed High High High 4.3 CVE-2016-5019 StorageTek Tape Analytics SW Tool Core (Apache Trinidad) Multiple Yes 9.8 Network Low None None Un- changed High High High Prior to 2.2.1 CVE-2015-4852 StorageTek Tape Analytics SW Tool WebLogic Server T3 Yes 9.8 Network Low None None Un- changed High High High Prior to 2.2.1 CVE-2015-7501 StorageTek Tape Analytics SW Tool Core (Apache Commons Collections) Multiple No 8.8 Network Low Low None Un- changed High High High Prior to 2.2.1 CVE-2017-3578 Sun ZFS Storage Appliance Kit (AK) RAS subsystems None No 8.8 Local Low Low None Changed High High High AK 2013 CVE-2017-3582 Oracle SuperCluster Specific Software Backup/Restore Utility None No 8.4 Local Low None None Un- changed High High High 2.3.8, 2.3.13 CVE-2017-3580 Sun ZFS Storage Appliance Kit (AK) RAS subsystems Multiple Yes 8.3 Network High None Required Changed High High High AK 2013 CVE-2017-3564 Solaris RBAC None No 8.2 Local Low Low Required Changed High High High 11.3 CVE-2017-3565 Solaris RBAC None No 7.9 Local Low Low Required Changed High High None 11.3 CVE-2017-3622 Solaris Common Desktop Environment (CDE) None No 7.8 Local Low Low None Un- changed High High High 10 See Note 2 CVE-2017-3584 Sun ZFS Storage Appliance Kit (AK) RAS subsystems None No 7.8 Local High Low None Changed High High High AK 2013 CVE-2017-3510 Solaris Kernel Zones virtualized NIC driver Multiple No 7.7 Network Low Low None Changed None High None 11.3 CVE-2017-3516 Solaris Kernel Zones virtualized NIC driver Multiple No 7.7 Network Low Low None Changed None None High 11.3 CVE-2017-3621 Sun ZFS Storage Appliance Kit (AK) IPC Frameworks Multiple Yes 7.5 Network Low None None Un- changed None None High AK 2013 CVE-2017-3497 Solaris Remote Administration Daemon Multiple Yes 7.3 Network Low None None Un- changed Low Low Low 11.3 CVE-2017-3551 Solaris Smartcard Libraries None No 6.6 Local Low Low None Un- changed Low Low High 11.3 CVE-2017-3585 Sun ZFS Storage Appliance Kit (AK) User Interface subsystem HTTP Yes 5.3 Network Low None None Un- changed None Low None AK 2013 CVE-2017-3498 Solaris Kernel None No 3.3 Local Low Low None Un- changed Low None None 11.3 CVE-2017-3474 Solaris Zone None No 3.3 Local Low Low None Un- changed Low None None 11.3 CVE-2016-5551 Solaris Cluster NAS device addition None No 3.3 Local Low None Required Un- changed Low None None 4.3

Notes:

CVE-2017-3623 is assigned for "Ebbisland". Solaris 10 systems which have had any Kernel patch installed after, or updated via patching tools since 2012-01-26 are not impacted. Also, any Solaris 10 system installed with Solaris 10 1/13 (Solaris 10 Update 11) are not vulnerable. Solaris 11 is not impacted by this issue. CVE-2017-3622 is assigned for the "Extremeparr".

Additional CVEs addressed are below:

The fix for CVE-2016-5019 also addresses CVE-2016-3504.

Appendix - Oracle Linux and Virtualization

Oracle Virtualization Executive Summary

This Critical Patch Update contains 15 new security fixes for Oracle Virtualization. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Virtualization Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2016-5407 Secure Global Desktop Window System (X11) TCP Yes 9.8 Network Low None None Un- changed High High High 4.71, 5.2, 5.3 CVE-2017-3561 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3563 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3576 Oracle VM VirtualBox Core None No 8.8 Local Low Low None Changed High High High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3558 Oracle VM VirtualBox Core None No 8.5 Local Low None None Changed Low Low High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3587 Oracle VM VirtualBox Shared Folder None No 8.4 Local Low Low None Changed None High High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3559 Oracle VM VirtualBox Core None No 7.9 Local Low Low None Changed Low Low High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3575 Oracle VM VirtualBox Core None No 7.9 Local Low High None Changed None High High Prior to 5.0.38, Prior to 5.1.20 CVE-2017-3538 Oracle VM VirtualBox Shared Folder None No 7.5 Local High Low None Changed High High None Prior to 5.0.34, Prior to 5.1.16 CVE-2017-3731 Secure Global Desktop Core (OpenSSL) SSL/TLS Yes 5.9 Network High None None Un- changed None None High 4.71, 5.2, 5.3 CVE-2013-1982 Secure Global Desktop Window System (X11) TCP Yes 5.6 Network High None None Un- changed Low Low Low 4.71 CVE-2016-3739 Secure Global Desktop Core (LibcURL) Multiple Yes 4.8 Network High None None Un- changed Low Low None 5.2, 5.3 CVE-2016-8743 Secure Global Desktop Web Server (Apache HTTP Server) HTTP Yes 4.0 Network High None None Changed Low None None 4.71, 5.2, 5.3 CVE-2016-0762 Secure Global Desktop Application Server (Apache Tomcat) HTTP Yes 3.7 Network High None None Un- changed Low None None 4.71, 5.2, 5.3 CVE-2017-3513 Oracle VM VirtualBox Core None No 2.5 Local High High None Changed Low None None Prior to 5.0.38, Prior to 5.1.20

Additional CVEs addressed are below:

The fix for CVE-2013-1982 also addresses CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987, CVE-2013-1995, CVE-2013-1998, CVE-2013-2002, CVE-2013-2003, and CVE-2013-2005.

The fix for CVE-2016-0762 also addresses CVE-2016-5018, CVE-2016-6794, CVE-2016-6796, CVE-2016-6797, CVE-2016-6816, CVE-2016-6817, and CVE-2016-8735.

The fix for CVE-2016-3739 also addresses CVE-2016-4802, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, and CVE-2016-8625.

The fix for CVE-2017-3731 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-7055, CVE-2017-3730, and CVE-2017-3732.

Appendix - Oracle MySQL

Oracle MySQL Executive Summary

This Critical Patch Update contains 40 new security fixes for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle MySQL Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-5638 MySQL Enterprise Monitor Monitoring: General (Struts 2) MySQL Protocol Yes 10.0 Network Low None None Changed High High High 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier, CVE-2016-6303 MySQL Workbench Workbench: Security: Encryption (OpenSSL) MySQL Protocol Yes 9.8 Network Low None None Un- changed High High High 6.3.8 and earlier CVE-2017-3523 MySQL Connectors Connector/J MySQL Protocol No 8.5 Network High Low None Changed High High High 5.1.40 and eariler CVE-2017-3306 MySQL Enterprise Monitor Monitoring: Server MySQL Protocol No 8.3 Network Low High Required Changed High High Low 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier CVE-2016-2176 MySQL Enterprise Backup Backup: ENTRBACK (OpenSSL) MySQL Protocol Yes 8.2 Network Low None None Un- changed Low None High 3.12.2 and earlier, 4.0.1 and earlier CVE-2016-2176 MySQL Workbench Workbench: Security: Encryption (OpenSSL) MySQL Protocol Yes 8.2 Network Low None None Un- changed Low None High 6.3.7 and earlier CVE-2017-3308 MySQL Server Server: DML MySQL Protocol No 7.7 Network Low Low None Changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3309 MySQL Server Server: Optimizer MySQL Protocol No 7.7 Network Low Low None Changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3450 MySQL Server Server: Memcached MySQL Protocol Yes 7.5 Network Low None None Un- changed None None High 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3599 MySQL Server Server: Pluggable Auth MySQL Protocol Yes 7.5 Network Low None None Un- changed None None High 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3329 MySQL Server Server: Thread Pooling MySQL Protocol Yes 7.5 Network Low None None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3600 MySQL Server Client mysqldump MySQL Protocol No 6.6 Network High High None Un- changed High High High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier See Note 1 CVE-2016-3092 MySQL Enterprise Monitor Monitoring: General (Apache Commons FileUpload) MySQL Protocol No 6.5 Network Low Low None Un- changed None None High 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier CVE-2017-3331 MySQL Server Server: DML MySQL Protocol No 6.5 Network Low Low None Un- changed None None High 5.7.11 to 5.7.17 CVE-2017-3453 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3452 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un- changed None None High 5.6.35 and earlier CVE-2017-3586 MySQL Connectors Connector/J MySQL Protocol No 6.4 Network Low Low None Changed Low Low None 5.1.41 and earlier CVE-2017-3732 MySQL Enterprise Backup Backup: ENTRBACK (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un- changed High None None 3.12.3 and earlier, 4.0.3 and earlier CVE-2017-3731 MySQL Enterprise Monitor Monitoring: General (OpenSSL) MySQL Protocol Yes 5.9 Network High None None Un- changed High None None 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier CVE-2017-3454 MySQL Server Server: InnoDB MySQL Protocol No 5.5 Network Low High None Un- changed None Low High 5.7.17 and earlier CVE-2017-3304 MySQL Cluster Cluster: DD MySQL Protocol No 5.4 Network Low Low None Un- changed None Low Low 7.2.27 and earlier, 7.3.16 and earlier, 7.4.14 and earlier, 7.5.5 and earlier CVE-2017-3455 MySQL Server Server: Security: Privileges MySQL Protocol No 5.4 Network Low Low None Un- changed Low Low None 5.7.17 and earlier CVE-2017-3305 MySQL Server Server: C API MySQL Protocol No 5.3 Network High Low None Un- changed High None None 5.5.55 and earlier, 5.6.35 and earlier CVE-2017-3302 MySQL Server Server: C API MySQL Protocol No 5.1 Local High None None Un- changed None None High 5.5.54 and earlier, 5.6.20 and earlier CVE-2017-3460 MySQL Server Server: Audit Plug-in MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.7.17 and earlier CVE-2017-3456 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3458 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.7.17 and earlier CVE-2017-3457 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.7.17 and earlier CVE-2017-3459 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.7.17 and earlier CVE-2017-3463 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3462 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3461 MySQL Server Server: Security: Privileges MySQL Protocol No 4.9 Network Low High None Un- changed None None High 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3464 MySQL Server Server: DDL MySQL Protocol No 4.3 Network Low Low None Un- changed None Low None 5.5.54 and earlier, 5.6.35 and earlier, 5.7.17 and earlier CVE-2017-3465 MySQL Server Server: Security: Privileges MySQL Protocol No 4.3 Network Low Low None Un- changed None Low None 5.7.17 and earlier CVE-2017-3467 MySQL Server Server: C API MySQL Protocol Yes 3.7 Network High None None Un- changed Low None None 5.7.17 and earlier CVE-2017-3469 MySQL Workbench Workbench: Security : Encryption MySQL Protocol Yes 3.7 Network High None None Un- changed Low None None 6.3.8 and earlier CVE-2017-3589 MySQL Connectors Connector/J MySQL Protocol No 3.3 Local Low Low None Un- changed None Low None 5.1.41 and earlier CVE-2017-3590 MySQL Connectors Connector/Python None No 3.3 Local Low Low None Un- changed None Low None 2.1.5 and earlier CVE-2017-3307 MySQL Enterprise Monitor Monitoring: Server MySQL Protocol No 3.1 Network High High Required Un- changed None Low Low 3.1.6.8003 and earlier, 3.2.1182 and earlier, 3.3.2.1162 and earlier CVE-2017-3468 MySQL Server Server: Security: Encryption MySQL Protocol No 3.1 Network High Low None Un- changed None Low None 5.7.17 and earlier

Notes:

CVE-2017-3600 is equivalent to CVE-2016-5483.

Additional CVEs addressed are below:

The fix for CVE-2016-2176 also addresses CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-2109.

The fix for CVE-2016-6303 also addresses CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6304, and CVE-2016-6306.

The fix for CVE-2017-3731 also addresses CVE-2016-7055, and CVE-2017-3732.

The fix for CVE-2017-3732 also addresses CVE-2016-7055, and CVE-2017-3731.

Appendix - Oracle Support Tools

Oracle Support Tools Executive Summary

This Critical Patch Update contains 13 new security fixes for Oracle Support Tools. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Support Tools Risk Matrix

CVE# Component Sub-component Protocol Remote Exploit without Auth.? CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes Base Score Attack Vector Attack Complex Privs Req'd User Interact Scope Confid­entiality Inte­grity Avail­ability CVE-2017-3234 Automatic Service Request (ASR) ASR Manager SFT Yes 9.8 Network Low None None Un- changed High High High Prior to 5.7 CVE-2017-3237 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un- changed High High High Prior to 5.7 CVE-2017-3581 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un- changed High High High Prior to 5.7 CVE-2017-3620 Automatic Service Request (ASR) ASR Manager None No 7.8 Local Low Low None Un- changed High High High Prior to 5.7 CVE-2017-3233 Automatic Service Request (ASR) ASR Manager HTTP Yes 7.5 Network Low None None Un- changed None High None Prior to 5.7 CVE-2016-6304 OSS Support Tools Oracle Explorer (OpenSSL) SSL/TLS Yes 7.5 Network Low None None Un- changed None None High Prior to RDA 8.15.17.3.14 CVE-2015-5252 Oracle Advanced Support Gateway Samba Service SMB Yes 7.2 Network Low None None Changed Low Low None Prior to 7.2 CVE-2017-3618 Automatic Service Request (ASR) ASR Manager None No 7.1 Local Low Low None Un- changed High High None Prior to 5.7 CVE-2017-3232 Automatic Service Request (ASR) ASR Manager None No 5.5 Local Low Low None Un- changed High None None Prior to 5.7 CVE-2017-3619 Automatic Service Request (ASR) ASR Manager None No 5.5 Local Low Low None Un- changed High None None Prior to 5.7 CVE-2017-3504 Automatic Service Request (ASR) ASR Manager None No 5.1 Local Low None None Un- changed None Low Low Prior to 5.7 CVE-2017-3505 Automatic Service Request (ASR) ASR Manager None No 5.1 Local Low None None Un- changed None Low Low Prior to 5.7 CVE-2004-2761 Oracle Trace File Analyzer (TFA) TFA Collector Multiple No 4.3 Network Low Low None Un- changed None Low None Prior to 12.1.2.8.4

Additional CVEs addressed are below: