Oracle's Critical Patch Update (CPU) for April contains 14 patches that fix the three-dozen flaws, several of which the company said could be easily and broadly exploited. Most of the bugs could be attacked remotely.
Although Oracle doesn't use a ranking system similar to Microsoft's or Apple's that detail the most critical vulnerabilities, in a separate alert to its customers security giant Symantec rated the urgency of patching as "10," its highest ranking. Danish vulnerability tracker Secunia, meanwhile, tagged the CPU as "Highly critical," its second-from-the-top rating.
"Several of these vulnerabilities are significant, and should be patched as soon as possible," Symantec wrote to subscribers of its DeepSight Threat Management System. "No workarounds for these issues have been published by Oracle."
Ron Ben-Natan, the chief technology officer of database security company Guardium, agreed. "Many of the vulnerabilities are easy to exploit and do not require advanced knowledge or skills," he said in an e-mail to TechWeb on Wednesday.
"Identity thieves search for the weakest link in database security, often using one small vulnerability to compromise multiple subsystems within the database engine," Ben-Natan added. "These patches are essential."
Tuesday's bugs affect Oracle Database, Oracle Application Server, Oracle Collaboration Server, Oracle E-Business Suite and Applications, Oracle Pharmaceutical Applications, Oracle Enterprise Manager, and Oracle Peoplesoft Enterprise and JD Edwards EnterpriseOne.
As always, Oracle remained tight-lipped about the vulnerabilities, although it published a risk matrix in its advisory to guide system administrators in prioritizing the patch process.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.