{"vuid":"VU#809457","idnumber":"809457","name":"Oracle Database vulnerable to privilege escalation","keywords":["Oracle Database","Core RDBMS","(DB01)","oracle_cpu_apr07"],"overview":"A vulnerability in Oracle Database for Microsoft Windows could allow a remote attacker to log on to the system with elevated privileges.","clean_desc":"A vulnerability exists in Oracle Database's Core Relational Database Management System (RDBMS) that may allow a remote attacker to log on to the system with elevated privileges. According to NGSSoftware-OracleCPUAPR2007: Due to the way that Windows XP with Simple File Sharing enabled logs on users it is possible for an attacker to gain DBA access to the Oracle server. Note that this issue affects Oracle Database versions including 9.0.1.5, 9.2.0.8, 10.1.0.5, and 10.2.0.2 installed in Microsoft Windows.","impact":"A remote attacker could log on to a vulnerable system and gain elevated privileges.","resolution":"Apply a patch\nSee the Oracle Critical Patch Update - April 2007 for information about obtaining upgrades.","workarounds":"Disable simple file sharing Disabling simple file sharing may mitigate this vulnerability. See Microsoft Knowledgebase Article 307874 for more details.","sysaffected":"","thanks":"This issue is addressed in \nOracle Critical Patch Update - April 2007","author":"This document was written by Chris Taschner.","public":["http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2007.html","http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html","http://www.ngssoftware.com/research/papers/NGSSoftware-OracleCPUAPR2007.pdf","http://www.ngssoftware.com/papers/database-on-xp.pdf","http://support.microsoft.com/kb/307874"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-04-17T13:35:44Z","publicdate":"2007-04-17T00:00:00Z","datefirstpublished":"2007-04-18T19:57:06Z","dateupdated":"2007-04-24T18:06:14Z","revision":26,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"18","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.26875","cam_scorecurrentwidelyknown":"9.9225","cam_scorecurrentwidelyknownexploited":"16.5375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.26875,"vulnote":null}