Vulnerabilities > CVE-2006-0256 - Unspecified vulnerability in Oracle Database Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN oracle
nessus
Summary
Unspecified vulnerability in the Advanced Queuing component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.2.0.6, 10.1.0.3 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB01.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | Databases |
NASL id | ORACLE_RDBMS_CPU_JAN_2006.NASL |
description | The remote Oracle database server is missing the January 2006 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Advanced Queuing - Change Data Capture - Connection Manager - Data Pump - Data Pump Metadata API - Dictionary - Java Net - Net Foundation Layer - Net Listener - Network Communications (RPC) - Oracle HTTP Server - Oracle Label Security - Oracle Text - Oracle Workflow Cartridge - Program Interface Network - Protocol Support - Query Optimizer - Reorganize Objects & Convert Tablespace - Security - Streams Apply - Streams Capture - Streams Subcomponent - TDE Wallet - Upgrade & Downgrade - XML Database |
last seen | 2020-06-02 |
modified | 2011-11-16 |
plugin id | 56051 |
published | 2011-11-16 |
reporter | This script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/56051 |
title | Oracle Database Multiple Vulnerabilities (January 2006 CPU) |
Saint
bid | 16287 |
description | Oracle XML Component DBMS_XMLSCHEMA.GENERATESCHEMA buffer overflow |
id | database_oracle_version |
osvdb | 22567 |
title | oracle_xml_generateschema |
type | remote |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 16287 CVE(CAN) ID: CVE-2006-0256 Oracle Database是一款大型商业数据库系统。 Oracle Database的登录过程实现存在漏洞,远程攻击者可能在登录过程中对服务器进行SQL注入攻击。 在登录过程中,协议认证部分由两个步骤组成,包含有两个不同的客户端请求和两个服务器响应。第一个请求(消息代码0x76)仅包含有用户名,而第二个请求(消息代码0x73)包含有用户名和乱码的口令。第二个请求还包含有“名称-值”对列表,描述客户端的各种属性,其中AUTH_ALTER_SESSION值用于创建区域和语言相关的会话属性。这个值中可能包含有任意SQL语句。此外,该命令是以Oracle访问控制机制之外的SYS用户环境执行的,因此通过将AUTH_ALTER_SESSION值设置为任意SQL语句攻击者就可以在数据库中执行任意命令。具体来说,攻击者可以创建新的数据库帐号并为帐号创建DBA权限。 Oracle Oracle8i 8.1.7.x.x Oracle Oracle9i 9.2.0.7 Oracle 10g Release 2 (10.2.0.1.0) Oracle 10g Release 1 (10.1.0.4.2) Oracle ------ Oracle已经为此发布了一个安全公告(cpujan2006)以及相应补丁: cpujan2006:Oracle Critical Patch Update - January 2006 链接:<a href=http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html?_template=/ocom/technology/cont target=_blank>http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html?_template=/ocom/technology/cont</a> |
id | SSV:4220 |
last seen | 2017-11-19 |
modified | 2006-08-17 |
published | 2006-08-17 |
reporter | Root |
title | Oracle DBMS绕过登录访问控制漏洞 |
References
- http://secunia.com/advisories/18493
- http://secunia.com/advisories/18493
- http://secunia.com/advisories/18608
- http://secunia.com/advisories/18608
- http://securitytracker.com/id?1015499
- http://securitytracker.com/id?1015499
- http://www.kb.cert.org/vuls/id/545804
- http://www.kb.cert.org/vuls/id/545804
- http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
- http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
- http://www.securityfocus.com/bid/16287
- http://www.securityfocus.com/bid/16287
- http://www.vupen.com/english/advisories/2006/0243
- http://www.vupen.com/english/advisories/2006/0243
- http://www.vupen.com/english/advisories/2006/0323
- http://www.vupen.com/english/advisories/2006/0323