search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Oracle CREATE_CHANGE_TABLE procedure vulnerable to PL/SQL injection

Vulnerability Note VU#446100

Original Release Date: 2006-10-24 | Last Revised: 2006-10-24


The Oracle CREATE_CHANGE_TABLE procedure is vulnerable to PL/SQL injection. This vulnerability may allow a remote, authenticated attacker to execute arbitrary PL/SQL commands on a vulnerable Oracle installation.


The Oracle CREATE_CHANGE_TABLE procedure fails to properly filter user input allowing PL/SQL injection to occur. Note that an attacker must have execute privileges on the SYS.DBMS_CDC_IPUBLISH package to exploit this vulnerability.

Based on research into public information, we believe that this issue is Oracle vuln# DB05 in the October 2006 Oracle CPU. However, there is not sufficient information to authoritatively relate Oracle vulnerability information to information provided by other parties.


A remote attacker may be able to execute arbitrary PL/SQL queries on a server, possibly with elevated privileges. As a result, attackers may be able to view or modify the contents of an Oracle database.


Apply patches
This issue is addressed in the Oracle Critical Patch Update for October 2006.

Vendor Information


Oracle Corporation Affected

Updated:  October 24, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was reported by in the Oracle Critical Patch Update for October 2006.

This document was written by Jeff Gennari based on information from Oracle and David Litchfield of NGSSoftware.

Other Information

CVE IDs: None
Severity Metric: 3.36
Date Public: 2006-10-17
Date First Published: 2006-10-24
Date Last Updated: 2006-10-24 13:35 UTC
Document Revision: 8

Sponsored by CISA.