This vulnerability allows local attackers to escalate privileges on affected installations of Oracle Database. Authentication is required to exploit this vulnerability. The specific flaw exists within the execution of stored procedures. When executing stored procedures, the process does not properly check the caller's privileges. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from users with limited privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.