CVE-2007-2111
https://notcve.org/view.php?id=CVE-2007-2111
SQL injection vulnerability in the SYS.DBMS_AQADM_SYS package in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 allows remote authenticated users to inject arbitrary SQL commands via unknown vectors, aka DB04. NOTE: as of 20070424, Oracle has not disputed reliable claims that DB04 is actually for multiple vulnerabilities. Una vulnerabilidad de inyección SQL en el paquete SYS.DBMS_AQADM_SYS en Oracle Database versiones 9.0.1.5, 9.2.0.7 y 10.1.0.5 permite a los usuarios autenticados remotos inyectar comandos SQL arbitrarios por medio de vectores desconocidos, también se conoce como DB04. NOTA: a partir de 24-04-2007, Oracle no ha cuestionado afirmaciones confiables que DB04 es realmente para múltiples vulnerabilidades. • http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_April_2007_Analysis.pdf http://www.ngssoftware.com/research/papers/NGSSoftware-OracleCPUAPR2007.pdf http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html http://www.securityfocus.com/archive/1/466329/100/200/threaded http://www.securityfocus.com/bid/23532 h • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2007-2110
https://notcve.org/view.php?id=CVE-2007-2110
Unspecified vulnerability in the Core RDBMS component for Oracle Database 9.0.1.5+, 9.2.0.7, and 10.1.0.4 on Windows systems has unknown impact and attack vectors, aka DB03. NOTE: as of 20070424, Oracle has not disputed reliable claims that DB03 occurs because RDBMS uses a NULL Discretionary Access Control List (DACL) for the Oracle process and certain shared memory sections, which allows local users to inject threads and execute arbitrary code via the OpenProcess, OpenThread, and SetThreadContext functions (DB03). Vulnerabilidad no especificada en el componente Core RDBMS para Oracle Database 9.0.1.5+, 9.2.0.7 y 10.1.0.4 sobre sistemas Windows tiene impacto y vectores de ataque no especificados, también conocida como DB03. NOTA: a partir de 20070424, Oracle no ha disputado alegaciones confiables sobre que DB03 ocurre debido a que RDBMS utiliza una NULL Discretionary Access Control List (DACL) para el proceso Oracle y determinadas secciones de memoria compartida, lo que permite a usuarios locales inyectar hilos y ejecutar código arbitrario a través de las funciones OpenProcess, OpenThread y SetThreadContext (DB03). • http://www.freelists.org/archives/oracle-l/12-2006/msg00004.html http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_April_2007_Analysis.pdf http://www.ngssoftware.com/research/papers/NGSSoftware-OracleCPUAPR2007.pdf http://www.oracle.com/technetwork/topics/security/cpuapr2007-090632.html http://www.red-database-security.com/advisory/oracle_cpu_apr_2007.html http://www.securityfocus.com/archive/1/466329/100/200/threaded http://www.securityfocus.com/bid/23532 http://www.secu •
CVE-2007-1442
https://notcve.org/view.php?id=CVE-2007-1442
Oracle Database 10g uses a NULL pDacl parameter when calling the SetSecurityDescriptorDacl function to create discretionary access control lists (DACLs), which allows local users to gain privileges. Oracle Database 10g utiliza un parámetro pDacl nulo al llamar a la función que crea listas de control de acceso discrecionales (DACLs), lo cual permite a usuarios locales obtener privilegios. • http://argeniss.com/research/10MinSecAudit.zip http://osvdb.org/33979 http://secunia.com/advisories/24475 http://www.securityfocus.com/bid/22905 •
CVE-2006-7141 – Oracle 9i/10g - 'utl_file' FileSystem Access
https://notcve.org/view.php?id=CVE-2006-7141
Absolute path traversal vulnerability in Oracle Database Server, when utl_file_dir is set to a wildcard value or "CREATE ANY DIRECTORY to PUBLIC" privileges exist, allows remote authenticated users to read and modify arbitrary files via full filepaths to utl_file functions such as (1) utl_file.put_line and (2) utl_file.get_line, a related issue to CVE-2005-0701. NOTE: this issue is disputed by third parties who state that this is due to an insecure configuration instead of an inherent vulnerability ** IMPUGNADO ** Vulnerabilidad de escalado de ruta en el Servidor de Base de Datos Oracle, cuando el utl_file_dir está establecido a un valor comodín o existen privilegios de "CREATE ANY DIRECTORY to PUBLIC", permite a usuarios remotos autenticados leer y modificar ficheros de su elección pasando rutas completas de ficheros a la función utl_file como la (1) utl_file.put_line y(2) utl_file.get_line, vulnerabilidad relacionada con la CVE-2005-0701. NOTA: esta vulnerabilidad está impugnada por terceras partes que determinan que esto se debe a una configuración insegura en vez de ser propiamente una vulnerabilidad. • https://www.exploit-db.com/exploits/2959 http://www.0xdeadbeef.info/exploits/raptor_orafile.sql http://www.securityfocus.com/archive/1/454862/100/0/threaded http://www.securityfocus.com/archive/1/454964/100/0/threaded http://www.securityfocus.com/archive/1/455047/100/0/threaded •
CVE-2006-7067
https://notcve.org/view.php?id=CVE-2006-7067
Oracle 10g R2 and possibly other versions allows remote attackers to trigger internal errors, and possibly have other impacts, via an "alter session set events" command with invalid arguments. NOTE: this issue was originally disputed by a third party, but the dispute was retracted. NOTE: this issue was called an "integer overflow" in the original source, but this might be incorrect. Oracle 10g R2 y posiblemente otras versiones permite a atacantes remotos disparar errores internos, y posiblemente tener otros impactos, mediante un comando para "alterar eventos de establecimiento de sesión" con argumentos inválidos. NOTA: este problema fue originalmente impugnado por una tercera parte, pero la impugnación fue retirada. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048251.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048292.html http://securityreason.com/securityalert/2328 http://www.securityfocus.com/archive/1/441345/100/0/threaded http://www.securityfocus.com/archive/1/441477/100/0/threaded •