Oracle Corp. on Tuesday released its quarterly patch batch, plugging 36 vulnerabilities in several of its products, including the flagship Oracle Database.
Although the number of fixes may seem high, it's actually less than half of the last Oracle bunch, which counted 82 fixes.
Oracle's Critical Patch Update (CPU) for April contains 14 patches that fix the three-dozen flaws, several of which the company said could be easily and broadly exploited. Most of the bugs could be attacked remotely.
Although Oracle doesn't use a ranking system similar to Microsoft's or Apple's that detail the most critical vulnerabilities, in a separate alert to its customers security giant Symantec rated the urgency of patching as "10," its highest ranking. Danish vulnerability tracker Secunia, meanwhile, tagged the CPU as "Highly critical," its second-from-the-top rating.
"Several of these vulnerabilities are significant, and should be patched as soon as possible," Symantec wrote to subscribers of its DeepSight Threat Management System. "No workarounds for these issues have been published by Oracle."
Ron Ben-Natan, the chief technology officer of database security company Guardium, agreed. "Many of the vulnerabilities are easy to exploit and do not require advanced knowledge or skills," he said in an e-mail to TechWeb on Wednesday.
"Identity thieves search for the weakest link in database security, often using one small vulnerability to compromise multiple subsystems within the database engine," Ben-Natan added. "These patches are essential."
Tuesday's bugs affect Oracle Database, Oracle Application Server, Oracle Collaboration Server, Oracle E-Business Suite and Applications, Oracle Pharmaceutical Applications, Oracle Enterprise Manager, and Oracle Peoplesoft Enterprise and JD Edwards EnterpriseOne.
As always, Oracle remained tight-lipped about the vulnerabilities, although it published a risk matrix in its advisory to guide system administrators in prioritizing the patch process.