{"vuid":"VU#221788","idnumber":"221788","name":"Oracle SYS.DBMS_AQ package vulnerable to PL/SQL injection","keywords":["Oracle","Database","SYS.DBMS_AQ","SQL injection","DB01","oracle_cpu_jan_2007"],"overview":"The Oracle SYS.DBMS_AQ package is vulnerable to PL/SQL injection. This vulnerability may allow a remote, authenticated attacker to execute arbitrary PL/SQL commands on a vulnerable Oracle installation.","clean_desc":"The Oracle SYS.DBMS_AQ package fails to properly sanitize user input.This may allow a remote attacker to insert arbitrary PL/SQL commands that may be executed by the database. Note that an attacker must have execute privileges on SYS_DBMS_AQ package to exploit this vulnerability. Based on research into public information, we believe that this issue is Oracle Vuln# DB01 in the October 2007 January CPU. However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.","impact":"A remote attacker may be able to execute PL/SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.","resolution":"Apply patches from Oracle\nThis issue is addressed in the Oracle Critical Patch Update for January 2007.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in the \nOracle Critical Patch Update for January 2007\n and by \nAlexander Kornbrust of \nRed-Database-Security GmbH","author":"This document was written by Jeff Gennari based on information from Oracle and Alexander Kornbrust of Red-Database-Security GmbH.","public":["http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html","http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html","http://www.red-database-security.com/advisory/oracle_cpu_jan_2007.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-17T14:28:02Z","publicdate":"2007-01-17T00:00:00Z","datefirstpublished":"2007-01-17T14:55:43Z","dateupdated":"2007-01-17T19:24:52Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"8","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"4.2","cam_scorecurrentwidelyknown":"7.8","cam_scorecurrentwidelyknownexploited":"13.8","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.2,"vulnote":null}