First published: Thu Dec 23 2004(Updated: )
SQL injection vulnerability in the (1) MDSYS.SDO_GEOM_TRIG_INS1 and (2) MDSYS.SDO_LRS_TRIG_INS default triggers in Oracle 9i and 10g allows remote attackers to execute arbitrary SQL commands via the new.table_name or new.column_name parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | =9.0.2.2 | |
Oracle Database | =9.0.1 | |
Oracle Database | =9.0.2 | |
Oracle Database | =9.0 | |
Oracle Database | =9.2.0.1 | |
Oracle Database | =9.2.0.2 | |
Oracle Database | =9.0.1.3 | |
Oracle Database | =9.0.1.2 | |
Oracle Database | =9.0.2.0.0 | |
Oracle Database | =9.0.2.1 | |
Oracle Database | =9.0.2.3 | |
Oracle Database | =10.2.1-r2 | |
Oracle Database | =9.0.1.4 | |
Oracle Database | =9.0.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1339 has a high severity level due to its potential to allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2004-1339, it is recommended to apply the latest security patches provided by Oracle for affected versions.
CVE-2004-1339 affects Oracle Database versions 9i and 10g, specifically various releases within those versions.
CVE-2004-1339 could enable attackers to perform SQL injection attacks, potentially compromising the database.
Yes, CVE-2004-1339 can be exploited by remote attackers to execute SQL commands on the targeted database.