This vulnerability allows local attackers to escalate privileges on affected installations of Oracle Database. Authentication is required to exploit this vulnerability. The specific flaw exists within the execution of stored procedures. When executing stored procedures, the process does not properly check the caller’s privileges. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from users with limited privileges.