Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via a reference to a malicious package in the TYPE_NAME argument in the (1) GET_DOMAIN_INDEX_TABLES or (2) GET_V2_DOMAIN_INDEX_TABLES function in the DBMS_EXPORT_EXTENSION package.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/432078/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/432354/100/0/threaded | mailing list |
http://www.kb.cert.org/vuls/id/932124 | third party advisory us government resource |
http://secunia.com/advisories/19860 | exploit third party advisory vendor advisory |
http://www.securityfocus.com/bid/17699 | vdb entry exploit |
http://www.securityfocus.com/archive/1/432355/100/0/threaded | mailing list |