lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060718211257.13890.qmail@securityfocus.com> Date: 18 Jul 2006 21:12:57 -0000 From: ak@...-database-security.com To: bugtraq@...urityfocus.com Subject: Oracle Database - SQL Injection in SYS.KUPW$WORKER [DB03] Name SQL Injection in package SYS.KUPW$WORKER (6980775) [DB03] Systems Oracle 10g Release 1 Severity High Risk Category SQL Injection Vendor URL http://www.oracle.com/ Author Alexander Kornbrust (ak at red-database-security.com) Advisory 18 Jul 2006 (V 1.00) Advisory ######## http://www.red-database-security.com/advisory/oracle_sql_injection_kupw$worker.html Details ####### The package SYS.KUPW$WORKER contains a SQL injection vulnerability in the MAIN procedure. This procedure is granted to PUBLIC by default. Oracle fixed this vulnerability with the package dbms_assert. To exploit this vulnerability it is necessary to have the privilege to create a PL/SQL-function. Patch Information ################# Apply the patches for Oracle CPU July 2006 on top of Oracle 10g Release 1. History ####### 01-nov-2005 Oracle secalert was informed 02-nov-2005 Bug confirmed 18-jul-2006 Oracle published CPU July 2006 [DB03] 18-jul-2006 Advisory published Additional Information ###################### An analysis of the Oracle CPU July 2006 is available here http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html This document will be updated during the next few days and weeks with the latest information.