{"vuid":"VU#736324","idnumber":"736324","name":"Oracle SYS.DBMS_CDC_IMPDP package vulnerable to PL/SQL injection","keywords":["Oracle","Database","Change Data Capture","CDC","SQL injection","BUMP_SEQUENCE","DB04","Oracle_CPU_Oct_2006"],"overview":"The Oracle SYS.DBMS_CDC_IMPDP package is vulnerable to PL/SQL injection. This vulnerability may allow a remote, authenticated attacker to execute arbitrary PL/SQL commands on a vulnerable Oracle installation.","clean_desc":"The Oracle SYS.DBMS_CDC_IMPDP package is vulnerable to PL/SQL injection. Specifically, the BUMP_SEQUENCE procedure fails to properly filter user input. Note that an attacker must have execute privileges on the SYS.DBMS_CDC_IMPDP package to exploit this vulnerability. Based on research into public information, we believe that this issue is Oracle vuln# DB04 in the October 2006 Oracle CPU. However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.","impact":"A remote attacker may be able to execute arbitrary PL/SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.","resolution":"Apply patches \nThis issue is addressed in the Oracle Critical Patch Update for October 2006.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by in the \nOracle Critical Patch Update for October 2006","author":"This document was written by Jeff Gennari based on information from Oracle, Alexander Kornbrust of Red-Database-Security GmbH, and David Litchfield of NGSSoftware.","public":["http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2006.html","http://www.databasesecurity.com/oracle/OracleOct2006-CPU-Analysis.pdf","http://secunia.com/advisories/22396/","http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_cdc_impdp2.html"],"cveids":["CVE-2006-5335"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-18T13:58:08Z","publicdate":"2006-10-17T00:00:00Z","datefirstpublished":"2006-10-24T13:11:50Z","dateupdated":"2006-10-24T13:56:16Z","revision":13,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"9","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.5940625","cam_scorecurrentwidelyknown":"10.7578125","cam_scorecurrentwidelyknownexploited":"19.3640625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.5940625,"vulnote":null}