Lucene search

K
cve[email protected]CVE-2008-3257
HistoryJul 22, 2008 - 4:41 p.m.

CVE-2008-3257

2008-07-2216:41:00
CWE-119
web.nvd.nist.gov
73
2
cve-2008-3257
apache connector
mod_wl
oracle weblogic server
buffer overflow
remote code execution
nvd

7.4 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.926 High

EPSS

Percentile

99.0%

Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after “POST /.jsp” in an HTTP request.

Affected configurations

NVD
Node
beaweblogic_serverMatch3.1.8
OR
beaweblogic_serverMatch4.0
OR
beaweblogic_serverMatch4.0.4
OR
beaweblogic_serverMatch4.5
OR
beaweblogic_serverMatch4.5.1
OR
beaweblogic_serverMatch4.5.1sp15
OR
beaweblogic_serverMatch4.5.2
OR
beaweblogic_serverMatch4.5.2sp1
OR
beaweblogic_serverMatch4.5.2sp2
OR
beaweblogic_serverMatch5.1
OR
beaweblogic_serverMatch5.1sp1
OR
beaweblogic_serverMatch5.1sp10
OR
beaweblogic_serverMatch5.1sp11
OR
beaweblogic_serverMatch5.1sp12
OR
beaweblogic_serverMatch5.1sp13
OR
beaweblogic_serverMatch5.1sp2
OR
beaweblogic_serverMatch5.1sp3
OR
beaweblogic_serverMatch5.1sp4
OR
beaweblogic_serverMatch5.1sp5
OR
beaweblogic_serverMatch5.1sp6
OR
beaweblogic_serverMatch5.1sp7
OR
beaweblogic_serverMatch5.1sp8
OR
beaweblogic_serverMatch5.1sp9
OR
beaweblogic_serverMatch6.0
OR
beaweblogic_serverMatch6.0sp1
OR
beaweblogic_serverMatch6.0sp2
OR
beaweblogic_serverMatch6.0sp6
OR
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp6
OR
beaweblogic_serverMatch6.1sp7
OR
beaweblogic_serverMatch6.1sp8
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp6
OR
beaweblogic_serverMatch7.0sp7
OR
beaweblogic_serverMatch7.0.0.1
OR
beaweblogic_serverMatch7.0.0.1sp1
OR
beaweblogic_serverMatch7.0.0.1sp2
OR
beaweblogic_serverMatch7.0.0.1sp3
OR
beaweblogic_serverMatch7.0.0.1sp4
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp5
OR
beaweblogic_serverMatch8.1sp6
OR
beaweblogic_serverMatch9.0
OR
beaweblogic_serverMatch9.0ga
OR
beaweblogic_serverMatch9.0sp1
OR
beaweblogic_serverMatch9.0sp2
OR
beaweblogic_serverMatch9.0sp3
OR
beaweblogic_serverMatch9.0sp4
OR
beaweblogic_serverMatch9.0sp5
OR
beaweblogic_serverMatch9.1
OR
beaweblogic_serverMatch9.1ga
OR
beaweblogic_serverMatch9.2
OR
beaweblogic_serverMatch9.2mp1
OR
beaweblogic_serverMatch9.2mp2
OR
beaweblogic_serverMatch10.0
OR
bea_systemsapache_connector_in_weblogic_server
OR
bea_systemsweblogic_serverMatch10.0_mp1
OR
oracleweblogic_serverRange10.3

Social References

More

7.4 High

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.926 High

EPSS

Percentile

99.0%