Oracle Security Alert for CVE-2014-0160

简介: Oracle Security Alert for CVE-2014-0160 Description This Security Alert addresses CVE-2014-0160 ('Heartbleed'), a publicl...

Oracle Security Alert for CVE-2014-0160


Description


This Security Alert addresses CVE-2014-0160 ('Heartbleed'), a publicly disclosed vulnerability which affects multiple OpenSSL versions implemented by various vendors in their products. This vulnerability affects multiple Oracle products. This vulnerability may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password. A remote user can exploit this vulnerability to impact the confidentiality of systems that are running affected versions of OpenSSL. According to http://heartbleed.com, the compromised data may contain passwords, private keys, and other sensitive information. In some instances, this information could be used by a malicious attacker to log into systems using a stolen identity or decrypt private information that was sent months or years ago.


Due to the severity, public disclosure and the reported exploitation of CVE-2014-0160 "in the wild," Oracle strongly recommends that customers apply the fixes provided by this Security Alert as soon as they are released by Oracle.


Affected Products and Versions

Please refer to OpenSSL Security Bug - Heartbleed / CVE-2014-0160 for a list of Oracle products and versions that are affected by this vulnerability.


Note: The page, OpenSSL Security Bug - Heartbleed / CVE-2014-0160 will be updated when new information becomes available.


Patch Availability

Patch availability information related to vulnerability CVE-2014-0160 can be found on the OpenSSL Security Bug - Heartbleed / CVE-2014-0160 page. Note that in some instances, the instructions on this page or references from this page may include important steps to take before and after the application of the relevant patch.


Supported Products and Versions

Patch availability information is provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. We recommend that customers remain on actively supported versions to ensure that they continue to receive security fixes from Oracle.


Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerability addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by this vulnerability.


Products in Extended Support

Security Alert fixes are available to customers who have purchased Extended Support under the Lifetime Support Policy. Customers must have a valid Extended Support service contract to apply Security Alert fixes for products in the Extended Support Phase.


References


Modification History

Date Comments
2014-April-18 Rev 1. Initial Release

 

Appendix - Third Party Components Risk Matrix


 

Third Party Components Risk Matrix Executive Summary


This Security Alert addresses the Heartbleed vulnerability in the OpenSSL third party component as it relates to Oracle products.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.  The English text form of this Risk Matrix can be found here.

Third Party Components Risk Matrix

CVE# Component Protocol Sub-
component
Remote Exploit without Auth.? CVSS VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen-
tication
Confiden-
tiality
Integrity Avail-
ability
CVE-2014-0160 OpenSSL Library SSL/TLS Heartbeat Extension Yes 5.0 Network Low None Partial None None 1.0.1 - 1.0.1f See Note 1
 

 

Notes:

  1. This vulnerability affects a number of Oracle products that include the affected OpenSSL libraries. See OpenSSL Security Bug - Heartbleed / CVE-2014-0160 for the list of affected products and current patch availability information.

目录
相关文章
|
SQL 关系型数据库 Linux
ORACLE 告警日志alert过大的处理
  现在,对于我来说,处理ORACLE告警日志alert多大不再是什么难题;但是,由于数据库是公司最重要的设备,不容有失,处理数据库相关的进程或文件还是要特别小心。  目前,ORACLE数据库主要分widows和LINUX/UNIX版本,对于LINUX/UNIX平台,我们可以使用tail -n /path/alert*.log|more来查看,很方便;但是,windows操作平台,我们遇到如下图所示那么大个的告警日志,该怎么查看。
3344 0
|
Oracle 安全 关系型数据库
Oracle Security Alert for CVE-2014-7169
Oracle Security Alert for CVE-2014-7169 Description This Security Alert addresses multiple publicly disclosed vulnerabil...
1149 0
|
SQL 监控 Oracle
Oracle EBS Alert 预警
Alert 是一种Oracle系统中的一种机制,它可以监视系统数据库,在规定的情况下给规定用户一个通知,通知可以是邮件或者其他形式,在标注的系统和客户化系统中都是可以定义使用的。
1405 0
|
Oracle 关系型数据库
Oracle 9i,10g,11g各自alert日志的位置
10g&9i的alert日志: 进入oracle: [zhangshengdong@oralocal1 ~]$ sudo su - oracle [oracle@oralocal1 ~]$ sqlplus "/as sysdba" SQL> select * from v$v...
967 0
|
4月前
|
Oracle 关系型数据库 Linux
【赵渝强老师】Oracle数据库配置助手:DBCA
Oracle数据库配置助手(DBCA)是用于创建和配置Oracle数据库的工具,支持图形界面和静默执行模式。本文介绍了使用DBCA在Linux环境下创建数据库的完整步骤,包括选择数据库操作类型、配置存储与网络选项、设置管理密码等,并提供了界面截图与视频讲解,帮助用户快速掌握数据库创建流程。
459 93
|
3月前
|
Oracle 关系型数据库 Linux
【赵渝强老师】使用NetManager创建Oracle数据库的监听器
Oracle NetManager是数据库网络配置工具,用于创建监听器、配置服务命名与网络连接,支持多数据库共享监听,确保客户端与服务器通信顺畅。
267 0
|
6月前
|
存储 Oracle 关系型数据库
服务器数据恢复—光纤存储上oracle数据库数据恢复案例
一台光纤服务器存储上有16块FC硬盘,上层部署了Oracle数据库。服务器存储前面板2个硬盘指示灯显示异常,存储映射到linux操作系统上的卷挂载不上,业务中断。 通过storage manager查看存储状态,发现逻辑卷状态失败。再查看物理磁盘状态,发现其中一块盘报告“警告”,硬盘指示灯显示异常的2块盘报告“失败”。 将当前存储的完整日志状态备份下来,解析备份出来的存储日志并获得了关于逻辑卷结构的部分信息。
|
4月前
|
SQL Oracle 关系型数据库
Oracle数据库创建表空间和索引的SQL语法示例
以上SQL语法提供了一种标准方式去组织Oracle数据库内部结构,并且通过合理使用可以显著改善查询速度及整体性能。需要注意,在实际应用过程当中应该根据具体业务需求、系统资源状况以及预期目标去合理规划并调整参数设置以达到最佳效果。
380 8
|
6月前
|
SQL Oracle 关系型数据库
比较MySQL和Oracle数据库系统,特别是在进行分页查询的方法上的不同
两者的性能差异将取决于数据量大小、索引优化、查询设计以及具体版本的数据库服务器。考虑硬件资源、数据库设计和具体需求对于实现优化的分页查询至关重要。开发者和数据库管理员需要根据自身使用的具体数据库系统版本和环境,选择最合适的分页机制,并进行必要的性能调优来满足应用需求。
353 11

推荐镜像

更多