7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.018 Low
EPSS
Percentile
88.2%
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or cause the web cache process to hang or exit.
Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the process running the web cache process, or cause the web cache process to hang or crash entirely. The Oracle9iAS Web Cache provides four services that are enabled by default when the software is installed. These services and the associated ports they listen on are given below:
1100/tcp incoming web cache proxy
4000/tcp administrative interface
4001/tcp web XML invalidation port
4002/tcp statistics port
This vulnerability occurs in all four of the services listed above. For more information, see the Oracle Security Alert and/or the Defcom Labs Security Advisory. It is also important to note that an exploit exists and is publicly available for this vulnerability.
An intruder can execute arbitrary code with the privileges of the web cache process and/or cause the web cache process to hang or exit. Additionally, an intruder might be able to intercept and/or modify sensitive data traversing the web cache device such as credentials and other types of sensitive information.
Contact vendor for patches.
649979
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: October 25, 2001
Affected
Please see <http://otn.oracle.com/deploy/security/pdf/webcache.pdf>.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23649979 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This document was written by Ian A. Finlay.
CVE IDs: | CVE-2001-0836 |
---|---|
CERT Advisory: | CA-2001-29 Severity Metric: |