SQL Injection in DBMS_EXPORT_EXTENSION package
Publish Date: 15 février 2011
Gravité: : Faible
Identifiant(s) CVE: : CVE-2006-2505
Date du conseil: 15 février 2011
Description
Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via a reference to a malicious package in the TYPE_NAME argument in the (1) GET_DOMAIN_INDEX_TABLES or (2) GET_V2_DOMAIN_INDEX_TABLES function in the DBMS_EXPORT_EXTENSION package.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1000427
Trend Micro Deep Security DPI Rule Name: 1000427 - Oracle Database Server Access Validation Vulnerability In DBMS_EXPORT_EXTENSION package
Affected software and version:
- Oracle Oracle10g Database Server Release 2