Oracle Database Server DACL Multiple Insecure Permissions Vulnerabilities

An attacker can use readily available process-monitoring tools to exploit these issues.

The following proof-of-concept exploit demonstrating arbitrary code execution with elevated privileges is available:


 

Privacy Statement
Copyright 2010, SecurityFocus