It marks another big patch announcement, following the 66 vulnerability update in January.
The hefty update is largely down to Oracle's acquisition of significant companies like PeopleSoft and Sun Microsystems, as well as its own wide range of products, said Amol Sarwate, Vulnerability Labs manager for Qualys.
“Our top priority goes to patching vulnerabilities that attackers can remotely exploit without authentication and where the affected systems could be exposed to the outside world,” Sarwate said.
“For Sun users this includes nine vulnerabilities that affect Solaris (CVE-2011-2287, CVE-2011-2245, CVE-2011-2294, CVE-2011-2298) SPARC (CVE-2011-2288, CVE-2011-2299, CVE-2011-2307) and Oracle GlassFish Server(CVE-2011-1511, CVE-2011-2260). Protocols that attackers could use for exploitation include SSH, HTTP, SSL and KSSL.”
The next priority for IT managers should be to look at vulnerabilities which could be remotely exploitable but affected products which typically would not be exposed due to network segregation or firewalls, Sarwate said.
This included patches for Oracle Database Server, Grid Control, Enterprise Manager and PeopleSoft.
“While some of the products may have a legitimate business reason to be exposed outside of the corporate network, we strongly advise organisations to access their network infrastructures and prioritise patches based on their exposure,” Sarwate said.
“The [Oracle patch updates] are becoming huge. But due to the diversity of affected products, our guess is that many larger organisations could have specialised teams working on different products in order to make the Oracle quarterly [update] a bit more manageable.”
The next batch of Oracle updates was due for 18 October, which would be the last of 2011.
Head here for Oracle’s announcement and breakdown of affected vulnerabilities.