-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Multiple SQL Injection vulnerabilities in DBMS_CDC_SUBSCRIBE and DBMS_CDC_ISUBSCRIBE packages AppSecInc Team SHATTER Security Advisory http://www.appsecinc.com/resources/alerts/oracle/2005-02.html April 18, 2005 Affected Versions: Oracle Database Server version 10g Risk level: High Credits: This vulnerability was discovered and researched by Esteban Martínez Fayó of Argeniss for Application Security Inc. Details: The SUBSCRIPTION_NAME parameter -- used in various procedures of SYS.DBMS_CDC_SUBSCRIBE and SYS.DBMS_CDC_ISUBSCRIBE packages -- is vulnerable to SQL injection. These packages execute with privileges of the SYS user; by default, PUBLIC has EXECUTE privilege. Impact: Any low privileged database user can execute functions with DBA privileges. Users with privilges to create or modify a function can inject a user-defined function in the vulnerable procedure and thus execute SQL statements with DBA privileges. Workaround: Revoke Execute privilege on the vulnerable packages. Vendor Status: Vendor was contacted and a patch was released. Fix: Apply Oracle Critical Patch Update April 2005 available at http://metalink.oracle.com Links: Application Security, Inc advisory: http://www.appsecinc.com/resources/alerts/oracle/2005-02.html Oracle security alert: http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf Advanced SQL Injection in Oracle databases presentation: http://www.argeniss.com/research.html - -- _____________________________________________ Application Security, Inc. www.appsecinc.com AppSecInc is the leading provider of database security solutions for the enterprise. AppSecInc products proactively secure enterprise applications at more than 300 organizations around the world by discovering, assessing, and protecting the database against rapidly changing security threats. By securing data at its source, we enable organizations to more confidently extend their business with customers, partners and suppliers. Our security experts, combined with our strong support team, deliver up-to-date application safeguards that minimize risk and eliminate its impact on business. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (MingW32) iD8DBQFCZARw/0w1dSVRt4URAi5jAKCYHOvAOJVm8XF6C3d3Ym5UPcnVPgCfT7W5 8xexdx/dQ10X4ToBcUETIKs= =Dqnl -----END PGP SIGNATURE-----
This archive was generated by hypermail 2.1.3 : Mon Apr 18 2005 - 16:32:50 PDT