This may seem a naive exercise - but I'm trying to determine the actual risk of this exploit vs the implementation risks required for our 11gR2 RAC environments. My understanding is that this exploit has been 'known' since 2008 - although not publicized. And Oracle rushed out the alert and fix in response to the publishing of the exploit. The exploit seems to be somewhat complex man-in-the middle attack that requires access inside the firewall, or your cluster's exposure to an insecure network. If this is not the case for our databases - if all clusters are contained within the internal network - and there is no exposure out - what is the real risk? We've tested in our lab - and were able to validate via the remote_listener from another cluster both prior to and after the fix. The 11gR2 fix is a little bit of a tedious process - involving a number of pieces, the wallets, etc. I hate to add complexity to our structure for the sake of appearances as opposed to a true necessity. Best, Jeff -- //www.freelists.org/webpage/oracle-l