Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via a reference to a malicious package in the TYPE_NAME argument in the (1) GET_DOMAIN_INDEX_TABLES or (2) GET_V2_DOMAIN_INDEX_TABLES function in the DBMS_EXPORT_EXTENSION package.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/932124 | US Government Resource |
http://www.securityfocus.com/bid/17699 | Exploit |
http://secunia.com/advisories/19860 | Exploit Vendor Advisory |
http://www.securityfocus.com/archive/1/432355/100/0/threaded | |
http://www.securityfocus.com/archive/1/432354/100/0/threaded | |
http://www.securityfocus.com/archive/1/432078/100/0/threaded |
Configurations
Information
Published : 2006-05-22 12:02
Updated : 2018-10-18 09:40
NVD link : CVE-2006-2505
Mitre link : CVE-2006-2505
JSON object : View
CWE
Products Affected
oracle
- database_server