CVE-2004-1370

Multiple SQL injection vulnerabilities in PL/SQL procedures that run with definer rights in Oracle 9i and 10g allow remote attackers to execute arbitrary SQL commands and gain privileges via (1) DBMS_EXPORT_EXTENSION, (2) WK_ACL.GET_ACL, (3) WK_ACL.STORE_ACL, (4) WK_ADM.COMPLETE_ACL_SNAPSHOT, (5) WK_ACL.DELETE_ACLS_WITH_STATEMENT, or (6) DRILOAD.VALIDATE_STMT.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite:11.5.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager:9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_database_control:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.5_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.0.6_.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:client_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:client_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*

History

20 Nov 2024, 23:50

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=110382596129607&w=2 - () http://marc.info/?l=bugtraq&m=110382596129607&w=2 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1 -
References () http://www.kb.cert.org/vuls/id/316206 - US Government Resource () http://www.kb.cert.org/vuls/id/316206 - US Government Resource
References () http://www.ngssoftware.com/advisories/oracle23122004H.txt - Patch, Vendor Advisory () http://www.ngssoftware.com/advisories/oracle23122004H.txt - Patch, Vendor Advisory
References () http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf - Patch, Vendor Advisory () http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10871 - Patch () http://www.securityfocus.com/bid/10871 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA04-245A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-245A.html - Patch, Third Party Advisory, US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18665 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18665 -

Information

Published : 2004-08-04 04:00

Updated : 2024-11-20 23:50


NVD link : CVE-2004-1370

Mitre link : CVE-2004-1370

CVE.ORG link : CVE-2004-1370


JSON object : View

Products Affected

oracle

  • oracle10g
  • enterprise_manager_database_control
  • e-business_suite
  • enterprise_manager
  • application_server
  • enterprise_manager_grid_control
  • oracle9i
  • collaboration_suite
  • oracle8i