Lucene search

K
saintSAINT CorporationSAINT:3731D876ADD116F969B63F8C1F9FB5C0
HistoryJul 25, 2008 - 12:00 a.m.

Oracle WebLogic Server Apache Connector POST buffer overflow

2008-07-2500:00:00
SAINT Corporation
download.saintcorporation.com
28

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.946 High

EPSS

Percentile

99.0%

Added: 07/25/2008
CVE: CVE-2008-3257
BID: 30273
OSVDB: 47096

Background

Oracle WebLogic Server (formerly BEA WebLogic Server) is a Java web application platform.

Problem

A buffer overflow in the Apache Connector for WebLogic Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted POST request.

Resolution

Apply a fix when available.

References

<http://secunia.com/advisories/31146/&gt;

Limitations

Exploit works on WebLogic Server 10.0. On Windows Server 2003, patch KB933729 (rpcrt4.dll version 5.2.3790.4115) must be installed.

Platforms

Windows 2000
Windows Server 2003

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.946 High

EPSS

Percentile

99.0%