Twenty-seven patches correct vulnerabilities in the widely deployed Oracle Database Server, five of which are remotely exploitable.
The most severe bug contains a Common Vulnerability Scoring System (CVSS) version 2 rating of 6.5 out of 10.
CVSS version 2 was improved to make the scores more accurate, Eric Maurice, manager of security in Oracle's global technology business unit, said on the company's Global Product Security Blog.
"[It] is designed to address the criticism that CVSS scores tended to be clustered around few score values," Maurice wrote. "A number of new distinctions are introduced that result in further spreading the typical range of the CVSS 'base score' and making the standard more representative of real-world vulnerabilities."
That includes expanding the distinction of "access vectors" to better explain what access rights an attacker requires to exploit a vulnerability.
But Amachai Shulman, CTO of database security firm Imperva, told SCMagazineUS.com that the updated system fails to paint an accurate picture. He said some of the database server bugs that were patched are more severe than the scores might indicate.
"A lot of the vulnerabilities in this release are vulnerabilities that do not require any special privileges," he said. "As long as you can connect to the database server, you can exploit those vulnerabilities."
The update also offered 11 fixes for the Application Server, eight for the E-Business Suite, three for PeopleSoft Enterprise and two for Enterprise Manager.
See original article on SC Magazine US
Oracle releases 51 patches, unveils new vulnerability rating system
By Dan Kaplan on Oct 18, 2007 10:01AM
Oracle on Tuesday delivered 51 fixes in a quarterly patch distribution that included an updated scoring system for organisations to measure the risk and impact of vulnerabilities.
Got a news tip for our journalists? Share it with us anonymously here.