Lucene search

K
cve[email protected]CVE-2005-1746
HistoryMay 24, 2005 - 4:00 a.m.

CVE-2005-1746

2005-05-2404:00:00
web.nvd.nist.gov
23
bea
weblogic
server
7.0
cluster
cookie
parsing
code
vulnerability
denial of service
remote attack

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

9.3 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

The cluster cookie parsing code in BEA WebLogic Server 7.0 through Service Pack 5 attempts to contact any host or port specified in a cookie, even when it is not in the cluster, which allows remote attackers to cause a denial of service (cluster slowdown) via modified cookies.

Affected configurations

NVD
Node
beaweblogic_serverMatch6.0
OR
beaweblogic_serverMatch6.0express
OR
beaweblogic_serverMatch6.0win32
OR
beaweblogic_serverMatch6.0sp1
OR
beaweblogic_serverMatch6.0sp1express
OR
beaweblogic_serverMatch6.0sp1win32
OR
beaweblogic_serverMatch6.0sp2
OR
beaweblogic_serverMatch6.0sp2express
OR
beaweblogic_serverMatch6.0sp2win32
OR
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1express
OR
beaweblogic_serverMatch6.1win32
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp1express
OR
beaweblogic_serverMatch6.1sp1win32
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp2express
OR
beaweblogic_serverMatch6.1sp2win32
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp3express
OR
beaweblogic_serverMatch6.1sp3win32
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp4express
OR
beaweblogic_serverMatch6.1sp4win32
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp5express
OR
beaweblogic_serverMatch6.1sp5win32
OR
beaweblogic_serverMatch6.1sp6
OR
beaweblogic_serverMatch6.1sp6win32
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0express
OR
beaweblogic_serverMatch7.0win32
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp1express
OR
beaweblogic_serverMatch7.0sp1win32
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp2express
OR
beaweblogic_serverMatch7.0sp2win32
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp3express
OR
beaweblogic_serverMatch7.0sp3win32
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp4express
OR
beaweblogic_serverMatch7.0sp4win32
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp5express
OR
beaweblogic_serverMatch7.0sp5win32
OR
beaweblogic_serverMatch7.0.0.1
OR
beaweblogic_serverMatch7.0.0.1express
OR
beaweblogic_serverMatch7.0.0.1win32
OR
beaweblogic_serverMatch7.0.0.1sp1
OR
beaweblogic_serverMatch7.0.0.1sp1express
OR
beaweblogic_serverMatch7.0.0.1sp1win32
OR
beaweblogic_serverMatch7.0.0.1sp2
OR
beaweblogic_serverMatch7.0.0.1sp2express
OR
beaweblogic_serverMatch7.0.0.1sp2win32
OR
beaweblogic_serverMatch7.0.0.1sp3
OR
beaweblogic_serverMatch7.0.0.1sp3express
OR
beaweblogic_serverMatch7.0.0.1sp4
OR
beaweblogic_serverMatch7.0.0.1sp4express
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1express
OR
beaweblogic_serverMatch8.1win32
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp1express
OR
beaweblogic_serverMatch8.1sp1win32
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp2express
OR
beaweblogic_serverMatch8.1sp2win32
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp3express
OR
beaweblogic_serverMatch8.1sp3win32
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp4express
OR
beaweblogic_serverMatch8.1sp4win32
OR
oracleweblogic_portalMatch8.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

9.3 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.3%

Related for CVE-2005-1746