10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.14 Low
EPSS
Percentile
95.7%
Oracle Application Server Web Cache contains a heap overflow vulnerability in the handling of client requests that could result in arbitrary code execution.
The Oracle Web Cache acts as a reverse proxy, caching static and dynamic content generated from Oracle Application web servers. There is a heap overflow vulnerability in the way Oracle Web Cache processes HTTP requests. By supplying an overly long HTTP Request Method header, an attacker could execute arbitrary code with privileges of the vulnerable process.
According to Oracle:
Web Cache must be running and configured to listen on the Oracle Application Server Web Cache listener port for any client request, regardless of the type of origin Web server (for example, Oracle HTTP Server, Apache or other web servers). If the client request is sent directly to origin Web server (i.e. Oracle HTTP Server, Apache or others), bypassing Web Cache, these vulnerabilities cannot be exploited.
The following products are affected:
* Oracle Application Server Web Cache 10g (9.0.4.0.0)
* Oracle9iAS Web Cache 9.0.3.1.0
* Oracle9iAS Web Cache 9.0.2.3.0
* Oracle9iAS Web Cache 2.0.0.4.0
* E-Business Suite 11i configured to use Oracle iStore 11i (11i.IBE.O and later) with Oracle Web Cache 9.0.2.2
* E-Business Suite 11i Early Adopter customers implementing MetaLink note 233436.1 should apply patches for Oracle Application Server 10g (9.0.4.0.0).
A remote, unauthenticated attacker could execute arbitrary code with privileges of the vulnerable process.
Apply PatchOracle has published Oracle Security Alert #66 regarding this issue. For further information, please refer to MetaLink Document ID 265310.1 (login required).
413006
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: March 22, 2004
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please refer to Oracle Security Alert 66.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23413006 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Ioannis Migadakis of InAccess Networks for reporting this vulnerability.
This document was written by Damon Morda.
CVE IDs: | CVE-2004-0385 |
---|---|
Severity Metric: | 20.32 Date Public: |
metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=265310.1
otn.oracle.com/deploy/security/pdf/2004alert66.pdf
otn.oracle.com/deploy/security/pdf/oracle_severity_ratings.pdf
otn.oracle.com/products/ias/web_cache/index.html
secunia.com/advisories/11118/
www.ietf.org/rfc/rfc2616.txt
www.inaccessnetworks.com/ian/services/secadv01.txt