{"vuid":"VU#982109","idnumber":"982109","name":"Oracle contains multiple SQL injection vulnerabilities","keywords":["Oracle","SQL injection","SYS.DBMS_CDC_SUBSCRIBE","SYS.DBMS_CDC_ISUBSCRIBE","DBMS_METADATA","DBMS_CDC_IPUBLISH.ALTER_MANUALLOG_CHANGE_SOURCE","DBMS_CDC_IPUBLISH.CREATE_SCN_CHANGE_SET","9i","10g","database","oracle_cpu_april_2005"],"overview":"Oracle Database Server versions 9i and 10g contain flaws that may allow SQL injection with privileges of the SYSDBA user.","clean_desc":"Oracle Database Server versions 9i and 10g are vulnerable to SQL injection. These flaws may allow a local attacker with the ability to create function definitions to execute procedures or SQL queries and updates on the vulnerable database application with SYSDBA privileges. The vulnerabilities are not platform specific.","impact":"A local attacker with the ability to create function definitions may be able to exploit SQL injection flaws in order to execute procedures or queries with the privileges of the SYSDBA user. In addition, any remotely accessible service that utilizes the flawed Oracle components may expose the vulnerabilities to a remote attacker.","resolution":"Apply An Update Oracle Critical Patch Update April 2005 contains information on fixes, updates, and workarounds.","workarounds":"","sysaffected":"","thanks":"Thanks to Esteban Martínez Fayó for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf","http://www.appsecinc.com/resources/alerts/oracle/2005-02.html","http://www.appsecinc.com/resources/alerts/oracle/2005-03.html","http://www.appsecinc.com/resources/alerts/oracle/2005-04.html","http://www.appsecinc.com/resources/alerts/oracle/2005-05.html","http://www.argeniss.com/research/OraDBMS_CDC_SUBSCRIBEExploit.txt","http://www.argeniss.com/research/OraDBMS_CDC_SUBSCRIBEWorkaround.sql","http://www.argeniss.com/research/OraDBMS_METADATAExploit.txt","http://www.argeniss.com/research/OraDBMS_METADATAWorkaround.sql","http://www.argeniss.com/research/OraALTER_MANUALLOG_CHANGE_SOURCEWorkaround.sql","http://www.argeniss.com/research/OraALTER_MANUALLOG_CHANGE_SOURCEWorkaround.sql","http://www.red-database-security.com/wp/comments_oracle_cpu_april_2005_us.pdf","http://secunia.com/advisories/14935/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-28T16:02:53Z","publicdate":"2005-04-12T00:00:00Z","datefirstpublished":"2005-04-19T19:54:23Z","dateupdated":"2005-04-29T18:17:42Z","revision":15,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"3","cam_scorecurrent":"1.89","cam_scorecurrentwidelyknown":"1.89","cam_scorecurrentwidelyknownexploited":"3.24","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.89,"vulnote":null}