lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 18 Apr 2007 12:26:10 +0200
From: Alexander Kornbrust <ak@...-database-security.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Advisory: SQL Injection in package
	SYS.DBMS_UPGRADE_INTERNAL

Name 	SQL Injection in package SYS.DBMS_UPGRADE_INTERNAL (6980753)  
[DB07]
Systems Affected 	Oracle 8i-10g Rel. 2
Severity 	                High Risk
Category 	        SQL Injection
Vendor URL 	        http://www.oracle.com/
Author     	        Alexander Kornbrust (ak at red-database- 
security.com)
Advisory          	17 April 2007 (V 1.00)


Details
#######
The package DBMS_UPGRADE_INTERNAL contains SQL injection  
vulnerabilities.

This advisory is available at
<http://www.red-database-security.com/advisory/ 
oracle_sql_injection_dbms_upgrade_internal.html>


Patch Information
#################
Apply the patches for Oracle CPU April 2007.


History
#######
01-nov-2005 Oracle secalert was informed
02-nov-2005 Bug confirmed
17-apr-2007 Oracle published CPU April 2007 [DB07]
17-apr-2007 Advisory published


Additional Information
######################
An analysis of the Oracle CPU April 2007 is available here
<http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html>

This document will be updated during the next few days and weeks with  
the
latest information.


(c) 2007 by Red-Database-Security GmbH
--
http://www.red-database-security.com



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ