Oracle Database Server 10g Release 2 allows local users to execute arbitrary SQL queries via a reference to a malicious package in the TYPE_NAME argument in the (1) GET_DOMAIN_INDEX_TABLES or (2) GET_V2_DOMAIN_INDEX_TABLES function in the DBMS_EXPORT_EXTENSION package.
http://www.securityfocus.com/archive/1/432355/100/0/threaded
http://www.securityfocus.com/archive/1/432354/100/0/threaded
http://www.securityfocus.com/archive/1/432078/100/0/threaded