search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Oracle views fail to enforce table security settings

Vulnerability Note VU#805737

Original Release Date: 2006-05-03 | Last Revised: 2007-01-03


A vulnerability in the way Oracle handles views may allow an attacker to modify privileged database information.


Database Views

A view is a queryable aggregation of data from one or more tables that is stored and maintained.

The Problem

A vulnerability in the way that Oracle handles specially crafted views may allow an attacker to bypass Oracle security settings and modify the underlying tables on which the view is built.

Originally, it was believed that an attacker must have the CREATE VIEW privilege and SELECT privileges on certain tables to exploit this vulnerability. However, according to public sources, the CREATE VIEW privilege is not needed.

Note that exploit code for this issue is publicly available.


A remote attacker may be able to execute arbitrary SQL statements with elevated privileges. This may allow the attacker to access and modify sensitive information within an Oracle database.


Apply Updates
We believe this issue is addressed in the Oracle Critical Patch Update for January 2006.

Until the update for this issue can be applied, the following workarounds may reduce the chances of exploitation.

Use Least Privilege

Where possible, grant users the fewest privileges needed to perform necessary tasks. Adding or removing privileges from roles may impact system functionality. Instead, privileges should be administered on a per-user basis.

Change login credentials for default Oracle accounts

Oracle creates numerous default accounts when it is installed. Upon installation, accounts that are not needed should be disabled and the login credentials for needed accounts should be changed.

Vendor Information


Oracle Corporation Affected

Notified:  April 12, 2006 Updated: May 03, 2006



Vendor Statement

We have fixed the vulnerability in our current code line as outlined here in our published "Security Vulnerability Fixing Policy and Process":

When we have patches available for all affected versions and platforms, we will schedule the fix to appear in a Critical Patch Update.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector



This vulnerability was reported by Alexander Kornbrust of Red Database Security. Red Database Security credits Jens Flasche, Dr. Christian Kleinew์hter, and Swen Thümmler with providing information regarding this issue. Information used in this document came from Oracle.

This document was written by Jeff Gennari and Stephen Rhoton.

Other Information

CVE IDs: None
Severity Metric: 12.66
Date Public: 2006-04-06
Date First Published: 2006-05-03
Date Last Updated: 2007-01-03 14:45 UTC
Document Revision: 107

Sponsored by CISA.