Oracle Security Update (Oct 2018)
RISK: Medium Risk
TYPE: Servers - Other Servers

Oracle has released Oct 2018 security update for their products:
Vulnerable Product | Severity | Impacts | Notes | Details (including CVE) |
Database | ![]() | Security Restriction Bypass Denial of Service | DB (2018-10) | |
Java SE | ![]() | Security Restriction Bypass Remote Code Execution Denial of Service Information Disclosure | JAVA (2018-10) | |
MySQL | ![]() | Security Restriction Bypass Remote Code Execution Denial of Service Data Manipulation | MSQL (2018-10) | |
Linux and Virtualization Products | ![]() | Security Restriction Bypass Remote Code Execution Denial of Service | OVIR (2018-10) | |
Sun Systems Products Suite | ![]() | Security Restriction Bypass Remote Code Execution Denial of Service Information Disclosure Data Manipulation | SUNS (2018-10) |
Number of 'Extremely Critical' product(s): 0
Number of 'Highly Critical' product(s): 0
Number of 'Moderately Critical' product(s): 5
Evaluation of overall 'Criticality Level': Moderately Critical
For other Oracle products not listed above, please refer to the following URL for more information:
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Data Manipulation
System / Technologies affected
- Database
- Java SE
- MySQL
- Linux and Virtualization Products
- Sun Systems Products Suite
- For other Oracle products not listed above, please refer to the following URL for more information:
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued security updates for the products. Please refer to 'Details' column in the above table for details of individual product update or run software update.
Vulnerability Identifier
Source
Related Link
Share with