Vulnerability Note VU#717140

Oracle ENABLE_HIERARCHY_INTERNAL procedure vulnerable to PL/SQL injection

Original Release date: 19 Oct 2006 | Last revised: 17 Jan 2007

Overview

The Oracle ENABLE_HIERARCHY_INTERNAL procedure is vulnerable to PL/SQL injection. This vulnerability may allow a remote, authenticated attacker to execute arbitrary PL/SQL commands on a vulnerable Oracle installation.

Description

The Oracle ENABLE_HIERARCHY_INTERNAL procedure fails to properly sanitize user input. This may allow a remote attacker to insert arbitrary SQL commands that may be executed by the database. Note that an attacker must have execute privileges on XDB.DBMS_XDBZ package to exploit this vulnerability.

Based on research into public information, we believe that this issue is Oracle vuln# DB01 in the October 2006 Oracle CPU. However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.

Impact

A remote attacker may be able to execute PL/SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.

Solution

Apply patches
This issue is addressed in the Oracle Critical Patch Update for October 2006.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Oracle CorporationAffected17 Oct 200619 Oct 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported in the Oracle Critical Patch Update for October 2006.

This document was written by Jeff Gennari based on information from Oracle, Alexander Kornbrust of Red-Database-Security GmbH, and David Litchfield of NGSSoftware.

Other Information

  • CVE IDs: CVE-2006-5332
  • Date Public: 17 Oct 2006
  • Date First Published: 19 Oct 2006
  • Date Last Updated: 17 Jan 2007
  • Severity Metric: 4.97
  • Document Revision: 23

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.