lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060418220741.4608.qmail@securityfocus.com>
Date: 18 Apr 2006 22:07:41 -0000
From: ak@...-database-security.com
To: bugtraq@...urityfocus.com
Subject: SQL Injection in package SYS.DBMS_LOGMNR_SESSION


SQL Injection in package SYS.DBMS_LOGMNR_SESSION

Name 	SQL Injection in package SYS.DBMS_LOGMNR_SESSION
Systems Affected 	Oracle Database
Severity 	Medium Risk
Category 	SQL Injection (DB06)
Vendor URL 	http://www.oracle.com/
Author 	Alexander Kornbrust (ak at red-database-security.com)
Advisory 	18 April 2006 (V 1.00)
Oracle Bugid 	6980723


Details
#######
The package SYS.DBMS_LOGMNR_SESSION contains a SQL injection vulnerability in the procedure DELETE_FROM_TABLE.
Oracle fixed this problem by using the package DBMS_ASSERT.

This advisory
##############
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_logmnr_session.html


Patch Information
#################
Apply the patches for Oracle CPU April 2006 on top of Oracle 9i Release 2 or Oracle 10g Release 1.
The patches are available via Oracle Metalink.



History
#######
01-nov-2005 Oracle secalert was informed
02-nov-2005 Oracle secalert asked for an exploit
18-apr-2006 Oracle published CPU April 2006
18-apr-2006 Advisory published



Additional information
######################
An analysis of the Oracle CPU April 2006 is available here
http://www.red-database-security.com/advisory/oracle_cpu_apr_2006.html

Many (40+) open security issues in Oracle are still unfixed
http://www.red-database-security.com/advisory/upcoming_alerts.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ