CVE-2006-0272
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/01/2006
Last modified:
03/04/2025
Description
Unspecified vulnerability in the XML Database component of Oracle Database server 9.2.0.7 and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB29. NOTE: based on mutual credits by the relevant sources, it is highly likely that this issue is a buffer overflow in the (a) DBMS_XMLSCHEMA and (b) DBMS_XMLSCHEMA_INT packages, as exploitable via long arguments to (1) XDB.DBMS_XMLSCHEMA.GENERATESCHEMA or (2) XDB.DBMS_XMLSCHEMA.GENERATESCHEMAS.
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html
- http://secunia.com/advisories/18493
- http://secunia.com/advisories/18608
- http://securitytracker.com/id?1015499=
- http://www.argeniss.com/research/ARGENISS-ADV-010601.txt
- http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf
- http://www.kb.cert.org/vuls/id/545804
- http://www.kb.cert.org/vuls/id/891644
- http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
- http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html
- http://www.securityfocus.com/bid/16287
- http://www.us-cert.gov/cas/techalerts/TA06-018A.html
- http://www.vupen.com/english/advisories/2006/0243
- http://www.vupen.com/english/advisories/2006/0323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24321
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24376
- http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0893.html
- http://secunia.com/advisories/18493
- http://secunia.com/advisories/18608
- http://securitytracker.com/id?1015499=
- http://www.argeniss.com/research/ARGENISS-ADV-010601.txt
- http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf
- http://www.kb.cert.org/vuls/id/545804
- http://www.kb.cert.org/vuls/id/891644
- http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html
- http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html
- http://www.securityfocus.com/bid/16287
- http://www.us-cert.gov/cas/techalerts/TA06-018A.html
- http://www.vupen.com/english/advisories/2006/0243
- http://www.vupen.com/english/advisories/2006/0323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24321
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24376