Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
There are 62 visitors online    
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Pete Finnigan's Oracle security weblog


Home » Archives » January 2007 » Details Oracle Critical Patch Update January 2007 - V1.02 released

[Previous entry: "Critical Patch Update January 2007 is out"] [Next entry: "Toolkit of generators and brute force tools"]

Details Oracle Critical Patch Update January 2007 - V1.02 released

January 18th, 2007 by Pete


Alex has created an analysis page for the most recent January 2007 CPU. His page is titled "Details Oracle Critical Patch Update January 2007 - V1.02". The page includes links to those bugs that have individual advisories available. There is less information about the database bugs than for the application server. There is also a nice link table for all of the database bugs to their CVE entries. The application server bugs include some brief details for most of the bugs as to what the issues are. As usual the database bugs that are in packages whilst not including details of the actual bug are reletively easy to work out if you have the tools to do it (a PL/SQL unwrapper).

January 2007
SMTWTFS
 123456
78910111213
14151617181920
21222324252627
28293031   

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

Weblog Home
Weblog Archives


Home
Oracle Security Tools page
Oracle security papers
Oracle Security alerts

Web Development
SQL Server Security

RSS 1.0 FEED
RSS 2.0 FEED
Atom 0.3 FEED
Powered by gm-rss 2.0.0


Valid XHTML 1.0!