Vulnerabilities > CVE-2008-3979 - Multiple vulnerability in Oracle January 2009 Critical Patch Update

047910
CVSS 5.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
oracle
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability that allows remote authenticated users to gain MDSYS privileges via the MDSYS.SDO_TOPO_DROP_FTBL trigger.

Vulnerable Configurations

Part Description Count
Application
Oracle
2

Exploit-Db

descriptionOracle 10g MDSYS.SDO_TOPO_DROP_FTBL SQL Injection Exploit (meta). CVE-2008-3979. Local exploits for multiple platform
fileexploits/multiple/local/8074.rb
idEDB-ID:8074
last seen2016-02-01
modified2009-02-18
platformmultiple
port
published2009-02-18
reportersh2kerr
sourcehttps://www.exploit-db.com/download/8074/
titleOracle 10g MDSYS.SDO_TOPO_DROP_FTBL SQL Injection Exploit meta
typelocal

Metasploit

descriptionThis module will escalate an Oracle DB user to MDSYS by exploiting a sql injection bug in the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege given to MDSYS user by creating evil trigger in system scheme (2-stage attack).
idMSF:AUXILIARY/SQLI/ORACLE/DROPTABLE_TRIGGER
last seen2020-03-02
modified2017-08-29
published2010-06-04
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/sqli/oracle/droptable_trigger.rb
titleOracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger

Nessus

NASL familyDatabases
NASL idORACLE_RDBMS_CPU_JAN_2009.NASL
descriptionThe remote Oracle database server is missing the January 2009 Critical Patch Update (CPU) and therefore is potentially affected by security issues in the following components : - Job Queue - Oracle OLAP - Oracle Spatial - Oracle Streams - SQL*Plus Windows GUI
last seen2020-06-02
modified2011-11-16
plugin id56063
published2011-11-16
reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/56063
titleOracle Database Multiple Vulnerabilities (January 2009 CPU)
code
#
# (C) Tenable Network Security, Inc.
#


include('compat.inc');

if (description)
{
  script_id(56063);
  script_version("1.26");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/01");

  script_cve_id(
    "CVE-2008-3973",
    "CVE-2008-3974",
    "CVE-2008-3978",
    "CVE-2008-3979",
    "CVE-2008-3997",
    "CVE-2008-3999",
    "CVE-2008-4015",
    "CVE-2008-5436",
    "CVE-2008-5437",
    "CVE-2008-5439"
  );
  script_bugtraq_id(33177);

  script_name(english:"Oracle Database Multiple Vulnerabilities (January 2009 CPU)");
  script_summary(english:"Checks installed patch info");

  script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");

  script_set_attribute(attribute:"description", value:
"The remote Oracle database server is missing the January 2009
Critical Patch Update (CPU) and therefore is potentially affected by
security issues in the following components :

  - Job Queue

  - Oracle OLAP

  - Oracle Spatial

  - Oracle Streams

  - SQL*Plus Windows GUI");

  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?14c7095b");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the January 2009 Oracle
Critical Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"d2_elliot_name", value:"Oracle Secure Backup 10.2.0.2 RCE (Windows)");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
  script_cwe_id(119);
script_set_attribute(attribute:"vuln_publication_date", value:"2009/01/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/01/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/11/16");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:database_server");
  script_set_attribute(attribute:"agent", value:"all");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("oracle_rdbms_query_patch_info.nbin", "oracle_rdbms_patch_info.nbin");

  exit(0);
}

include("oracle_rdbms_cpu_func.inc");

################################################################################
# JAN2009
patches = make_nested_array();

# RDBMS 11.1.0.6
patches["11.1.0.6"]["db"]["nix"] = make_array("patch_level", "11.1.0.6.5", "CPU", "7592335");
patches["11.1.0.6"]["db"]["win32"] = make_array("patch_level", "11.1.0.6.8", "CPU", "7631980");
patches["11.1.0.6"]["db"]["win64"] = make_array("patch_level", "11.1.0.6.8", "CPU", "7631981");
# RDBMS 10.1.0.5
patches["10.1.0.5"]["db"]["nix"] = make_array("patch_level", "10.1.0.5.13", "CPU", "7592360");
patches["10.1.0.5"]["db"]["win32"] = make_array("patch_level", "10.1.0.5.29", "CPU", "7486619");
# RDBMS 10.2.0.4
patches["10.2.0.4"]["db"]["nix"] = make_array("patch_level", "10.2.0.4.0.3", "CPU", "7592346");
patches["10.2.0.4"]["db"]["win32"] = make_array("patch_level", "10.2.0.4.13", "CPU", "7584866");
patches["10.2.0.4"]["db"]["win64"] = make_array("patch_level", "10.2.0.4.13", "CPU", "7584867");
# RDBMS 10.2.0.3
patches["10.2.0.3"]["db"]["nix"] = make_array("patch_level", "10.2.0.3.9", "CPU", "7592354");
patches["10.2.0.3"]["db"]["win32"] = make_array("patch_level", "10.2.0.3.29", "CPU", "7631956");
patches["10.2.0.3"]["db"]["win64"] = make_array("patch_level", "10.2.0.3.29", "CPU", "7631957");

check_oracle_database(patches:patches);

Saint

  • bid33177
    descriptionOracle Secure Backup NDMP_CONECT_CLIENT_AUTH buffer overflow
    iddatabase_oracle_backupndmpbo,database_oracle_backupver
    osvdb51340
    titleoracle_secure_backup_ndmp_clientauth
    typeremote
  • bid33177
    descriptionOracle Secure Backup login.php ora_osb_lcookie command execution
    iddatabase_oracle_backupver
    osvdb51343
    titleoracle_secure_backup_login_lcookie
    typeremote
  • bid33177
    descriptionOracle WebLogic Server IIS Connector JSESSIONID buffer overflow
    titleweblogic_iis_connector_jsessionid
    typeremote
  • bid33177
    descriptionOracle Secure Backup login.php rbtool command injection
    iddatabase_oracle_backupver
    osvdb51342
    titleoracle_secure_backup_login_rbtool
    typeremote
  • bid33177
    descriptionOracle Database OLAP component ODCITABLESTART buffer overflow
    iddatabase_oracle_version
    osvdb51347
    titleoracle_olap_odcitablestart
    typeremote