Vulnerabilities > CVE-2006-0256 - Multiple vulnerability in Oracle January Security Update

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oracle
critical
nessus

Summary

Unspecified vulnerability in the Advanced Queuing component of Oracle Database server 8.1.7.4, 9.0.1.5, 9.2.0.6, 10.1.0.3 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB01.

Nessus

NASL familyDatabases
NASL idORACLE_RDBMS_CPU_JAN_2006.NASL
descriptionThe remote Oracle database server is missing the January 2006 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Advanced Queuing - Change Data Capture - Connection Manager - Data Pump - Data Pump Metadata API - Dictionary - Java Net - Net Foundation Layer - Net Listener - Network Communications (RPC) - Oracle HTTP Server - Oracle Label Security - Oracle Text - Oracle Workflow Cartridge - Program Interface Network - Protocol Support - Query Optimizer - Reorganize Objects & Convert Tablespace - Security - Streams Apply - Streams Capture - Streams Subcomponent - TDE Wallet - Upgrade & Downgrade - XML Database
last seen2020-06-02
modified2011-11-16
plugin id56051
published2011-11-16
reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/56051
titleOracle Database Multiple Vulnerabilities (January 2006 CPU)

Saint

bid16287
descriptionOracle XML Component DBMS_XMLSCHEMA.GENERATESCHEMA buffer overflow
iddatabase_oracle_version
osvdb22567
titleoracle_xml_generateschema
typeremote

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 16287 CVE(CAN) ID: CVE-2006-0256 Oracle Database是一款大型商业数据库系统。 Oracle Database的登录过程实现存在漏洞,远程攻击者可能在登录过程中对服务器进行SQL注入攻击。 在登录过程中,协议认证部分由两个步骤组成,包含有两个不同的客户端请求和两个服务器响应。第一个请求(消息代码0x76)仅包含有用户名,而第二个请求(消息代码0x73)包含有用户名和乱码的口令。第二个请求还包含有“名称-值”对列表,描述客户端的各种属性,其中AUTH_ALTER_SESSION值用于创建区域和语言相关的会话属性。这个值中可能包含有任意SQL语句。此外,该命令是以Oracle访问控制机制之外的SYS用户环境执行的,因此通过将AUTH_ALTER_SESSION值设置为任意SQL语句攻击者就可以在数据库中执行任意命令。具体来说,攻击者可以创建新的数据库帐号并为帐号创建DBA权限。 Oracle Oracle8i 8.1.7.x.x Oracle Oracle9i 9.2.0.7 Oracle 10g Release 2 (10.2.0.1.0) Oracle 10g Release 1 (10.1.0.4.2) Oracle ------ Oracle已经为此发布了一个安全公告(cpujan2006)以及相应补丁: cpujan2006:Oracle Critical Patch Update - January 2006 链接:<a href=http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html?_template=/ocom/technology/cont target=_blank>http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html?_template=/ocom/technology/cont</a>
idSSV:4220
last seen2017-11-19
modified2006-08-17
published2006-08-17
reporterRoot
titleOracle DBMS绕过登录访问控制漏洞