|
=0D
Name SQL Injection in package SYS.KUPW$WORKER (6980775) [DB03]=0D
Systems Oracle 10g Release 1=0D
Severity High Risk=0D
Category SQL Injection=0D
Vendor URL http://www.oracle.com/=0D
Author Alexander Kornbrust (ak at red-database-security.com)=0D
Advisory 18 Jul 2006 (V 1.00)=0D
=0D
=0D
Advisory=0D
########=0D
http://www.red-database-security.com/advisory/oracle_sql_injection_kupw$worker.html=0D
=0D
=0D
Details=0D
#######=0D
The package SYS.KUPW$WORKER contains a SQL injection vulnerability in the MAIN procedure. This procedure is granted to PUBLIC by default. Oracle fixed this vulnerability with the package dbms_assert. To exploit this vulnerability it is necessary to have the privilege to create a PL/SQL-function.=0D
=0D
=0D
Patch Information=0D
#################=0D
Apply the patches for Oracle CPU July 2006 on top of Oracle 10g Release 1.=0D
=0D
=0D
History=0D
#######=0D
01-nov-2005 Oracle secalert was informed=0D
02-nov-2005 Bug confirmed=0D
18-jul-2006 Oracle published CPU July 2006 [DB03]=0D
18-jul-2006 Advisory published=0D
=0D
=0D
Additional Information=0D
######################=0D
An analysis of the Oracle CPU July 2006 is available here http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html=0D
=0D
This document will be updated during the next few days and weeks with the latest information.=0D
=0D