CVE-2006-0272

Unspecified vulnerability in the XML Database component of Oracle Database server 9.2.0.7 and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB29. NOTE: based on mutual credits by the relevant sources, it is highly likely that this issue is a buffer overflow in the (a) DBMS_XMLSCHEMA and (b) DBMS_XMLSCHEMA_INT packages, as exploitable via long arguments to (1) XDB.DBMS_XMLSCHEMA.GENERATESCHEMA or (2) XDB.DBMS_XMLSCHEMA.GENERATESCHEMAS.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html
http://secunia.com/advisories/18493 Vendor Advisory
http://secunia.com/advisories/18608 Vendor Advisory
http://securitytracker.com/id?1015499
http://www.argeniss.com/research/ARGENISS-ADV-010601.txt
http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf
http://www.kb.cert.org/vuls/id/545804 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/891644 US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html
http://www.securityfocus.com/bid/16287
http://www.us-cert.gov/cas/techalerts/TA06-018A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0243 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0323 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24321
https://exchange.xforce.ibmcloud.com/vulnerabilities/24376
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html
http://secunia.com/advisories/18493 Vendor Advisory
http://secunia.com/advisories/18608 Vendor Advisory
http://securitytracker.com/id?1015499
http://www.argeniss.com/research/ARGENISS-ADV-010601.txt
http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf
http://www.kb.cert.org/vuls/id/545804 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/891644 US Government Resource
http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html
http://www.securityfocus.com/bid/16287
http://www.us-cert.gov/cas/techalerts/TA06-018A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0243 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0323 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24321
https://exchange.xforce.ibmcloud.com/vulnerabilities/24376
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html -
References () http://secunia.com/advisories/18493 - Vendor Advisory () http://secunia.com/advisories/18493 - Vendor Advisory
References () http://secunia.com/advisories/18608 - Vendor Advisory () http://secunia.com/advisories/18608 - Vendor Advisory
References () http://securitytracker.com/id?1015499 - () http://securitytracker.com/id?1015499 -
References () http://www.argeniss.com/research/ARGENISS-ADV-010601.txt - () http://www.argeniss.com/research/ARGENISS-ADV-010601.txt -
References () http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf - () http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf -
References () http://www.kb.cert.org/vuls/id/545804 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/545804 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/891644 - US Government Resource () http://www.kb.cert.org/vuls/id/891644 - US Government Resource
References () http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html - () http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html -
References () http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html - () http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html -
References () http://www.securityfocus.com/bid/16287 - () http://www.securityfocus.com/bid/16287 -
References () http://www.us-cert.gov/cas/techalerts/TA06-018A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-018A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/0243 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0243 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/0323 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0323 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24321 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24321 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24376 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24376 -

Information

Published : 2006-01-18 11:03

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0272

Mitre link : CVE-2006-0272

CVE.ORG link : CVE-2006-0272


JSON object : View

Products Affected

oracle

  • oracle9i
  • oracle10g