Overview
A vulnerability in Oracle PL/SQL Export Extensions may allow an attacker to modify privileged database information.
Description
Oracle Extensions, ODCIIndex Interface, and ODCIIndexGetMetadata Oracle extensions are used to create customized Oracle database constructs. An indextype is an Oracle extension that allows users to create specialized indexes on an Oracle database. To create a new indextype, the ODCIIndex Interface must be implemented, meaning that certain methods specified in that interface must be defined. The ODCIIndexGetMetadata(...) routine is one such method in the ODCIIndex Interface. When the ODCIIndex Interface is implemented for a new indextype, the ODCIIndexGetMetadata(...)routine is used to specify how metadata for that indextype should be handled. |
Impact
A remote attacker with some authentication credentials may be able to execute arbitrary SQL statements with elevated privileges. This may allow the attacker to access and modify sensitive information within an Oracle database. |
Solution
Apply Oracle CPU Oracle has released the Oracle Critical Patch Update (CPU) for July 2006. It is unclear from the Oracle documentation whether this issue is addressed by this CPU. Public reports indicate that this issue has been addressed by this CPU, but this has not been confirmed. |
Until a patch for this issue can be applied, the following actions may reduce the chances of exploitation: Only known and trusted users should be allowed access to Oracle. Additionally, user accounts should only be granted the fewest privileges needed to perform necessary tasks. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.juniper.net/security/auto/vulnerabilities/vuln3319.html
- http://secunia.com/advisories/19860
- http://www.securityfocus.com/bid/17699
- http://www.red-database-security.com/exploits/oracle-sql-injection-oracle-dbms_export_extension.html
- http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2006.html
- http://www.red-database-security.com/advisory/oracle_cpu_jul_2006.html
Acknowledgements
This vulnerability was reported by David Litchfield of NGS Software.
This document was written by Jeff Gennari and Stephen Rhoton.
Other Information
CVE IDs: | CVE-2006-3702 |
Severity Metric: | 18.56 |
Date Public: | 2006-04-26 |
Date First Published: | 2006-05-03 |
Date Last Updated: | 2006-07-25 19:04 UTC |
Document Revision: | 100 |