[Full-disclosure] Oracle Database 10g Rel. 1 - SQL Injection in SYS.KUPV$FT_INT

Type securityvulns
Reporter Securityvulns
Modified 2006-01-18T00:00:00


Oracle forgot to inform me that these vulnerabilities are also fixed.

http://www.red-database-security.com/advisory/oracle_sql_injection_kupv$ ft_int.html

Name SQL Injection in package SYS.KUPV$FT_INT Affected Oracle 10g Release 1 Severity High Risk Category SQL Injection Vendor URL http://www.oracle.com/ Author Alexander Kornbrust (ak at red-database-security.com) Advisory 17 Jan 2006 (V 1.00)


The package SYS.KUPV$FT_INT contains 16 SQL injection vulnerabilities in the functions UPDATE_JOB, ACTIVE_JOB, ATTACH_POSSIBLE, ATTACH_TO_JOB, CREATE_NEW_JOB, DELETE_JOB, DELETE_MASTER_TABLE, DETACH_JOB, GET_JOB_INFO, GET_JOB_QUEUES, GET_SOLE_JOBNAME, MASTER_TBL_LOCK, VALID_HANDLE. Oracle is using bind variables or the dbms_assert package to fix these vulnerabilities.

Patch Information:

Apply the patches for Oracle CPU Jan 2006 on top of Oracle 10g Release 1.


01-nov-2005 Oracle secalert was informed about vulnerabilities in ACTIVE_JOB, ATTACH_JOB, ATTACH_POSSIBLE, CREATE_NEW_JOB, DELETE_JOB, UPDATE_JOB 02-nov-2005 Oracle secalert asked for an exploit 17-jan-2006 Oracle published CPU January 2006 17-jan-2006 Advisory published

(c) 2006 by Red-Database-Security GmbH http://www.red-database-security.com/advisory/published_alerts.html

Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/