Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0547

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2006-0547
Last Modified 05 Sep 2008 04:59:34
Published 03 Feb 2006 09:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0547

Summary

Oracle Database 8i, 9i, and 10g allow remote authenticated users to execute arbitrary SQL statements in the context of the SYS user and bypass audit logging, including statements to create new privileged database accounts, via a modified AUTH_ALTER_SESSION attribute in the authentication phase of the Transparent Network Substrate (TNS) protocol. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB18 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0265.

Vulnerable Systems

Application

  • Oracle Database Server 10.1.0.3

  • Oracle Database Server 10.1.0.4

  • Oracle Database Server 10.1.0.5

  • Oracle Database Server 10.2.0.1

  • Oracle Database Server 8.1.7.4

  • Oracle Database Server 9.2.0.6

  • Oracle Database Server 9.2.0.7


References

CERT - TA06-018A

CERT-VN - VU#871756

MISC - http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html

MISC - http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html

MISC - http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf

MISC - http://www.imperva.com/application_defense_center/papers/oracle-dbms-01172006.html

XF - oracle-login-command-execute(24184)

FULLDISC - 20060117 Oracle DBMS - Access Control Bypass in Login


Last Updated: 27 May 2016 10:41:42