CVE-2006-0547

Severity

75%

Complexity

99%

Confidentiality

106%

Oracle Database 8i, 9i, and 10g allow remote authenticated users to execute arbitrary SQL statements in the context of the SYS user and bypass audit logging, including statements to create new privileged database accounts, via a modified AUTH_ALTER_SESSION attribute in the authentication phase of the Transparent Network Substrate (TNS) protocol. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB18 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0265.

Oracle Database 8i, 9i, and 10g allow remote authenticated users to execute arbitrary SQL statements in the context of the SYS user and bypass audit logging, including statements to create new privileged database accounts, via a modified AUTH_ALTER_SESSION attribute in the authentication phase of the Transparent Network Substrate (TNS) protocol. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB18 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0265.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

First reported 19 years ago

2006-02-04 02:02:00

Last updated 7 years ago

2017-07-20 01:29:00

Affected Software

Oracle Database Server 8.1.7.4 Release 3

8.1.7.4

Oracle Database Server 9.2.0.6 Release 2

9.2.0.6

オラクル データベースサーバ 9.2.0.7 リリース 2

9.2.0.7

オラクル データベースサーバ 10g 10.1.0.3 リリース 1

10.1.0.3

Oracle Database Server 10g 10.1.0.4 Release 1

10.1.0.4

Oracle Database Server 10g 10.1.0.5 Release 1

10.1.0.5

オラクル データベースサーバ 10g 10.2.0.1 リリース 2

10.2.0.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.