Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Oracle :: b06-3697.htm

Oracle Database - SQL Injection in SYS.KUPW$WORKER



Oracle Database - SQL Injection in SYS.KUPW$WORKER
Oracle Database - SQL Injection in SYS.KUPW$WORKER



=0D
Name   	SQL Injection in package SYS.KUPW$WORKER (6980775) [DB03]=0D
Systems 	Oracle 10g Release 1=0D
Severity 	High Risk=0D
Category 	SQL Injection=0D
Vendor URL 	http://www.oracle.com/=0D 
Author 	Alexander Kornbrust (ak at red-database-security.com)=0D
Advisory 	18 Jul 2006 (V 1.00)=0D
=0D
=0D
Advisory=0D
########=0D
http://www.red-database-security.com/advisory/oracle_sql_injection_kupw$worker.html=0D 
=0D
=0D
Details=0D
#######=0D
The package SYS.KUPW$WORKER contains a SQL injection vulnerability in the MAIN procedure. This procedure is granted to PUBLIC by default. Oracle fixed this vulnerability with the package dbms_assert. To exploit this vulnerability it is necessary to have the privilege to create a PL/SQL-function.=0D
=0D
=0D
Patch Information=0D
#################=0D
Apply the patches for Oracle CPU July 2006 on top of Oracle 10g Release 1.=0D
=0D
=0D
History=0D
#######=0D
01-nov-2005 Oracle secalert was informed=0D
02-nov-2005 Bug confirmed=0D
18-jul-2006 Oracle published CPU July 2006 [DB03]=0D
18-jul-2006 Advisory published=0D
=0D
=0D
Additional Information=0D
######################=0D
An analysis of the Oracle CPU July 2006 is available here http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html=0D 
=0D
This document will be updated during the next few days and weeks with the latest information.=0D
=0D


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH