Lucene search

K
saintSAINT CorporationSAINT:B9FC881966A71AF98F59E5D20BA2A052
HistoryJul 25, 2008 - 12:00 a.m.

Oracle WebLogic Server Apache Connector POST buffer overflow

2008-07-2500:00:00
SAINT Corporation
download.saintcorporation.com
24

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.8

Confidence

Low

EPSS

0.94

Percentile

99.2%

Added: 07/25/2008
CVE: CVE-2008-3257
BID: 30273
OSVDB: 47096

Background

Oracle WebLogic Server (formerly BEA WebLogic Server) is a Java web application platform.

Problem

A buffer overflow in the Apache Connector for WebLogic Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted POST request.

Resolution

Apply a fix when available.

References

http://secunia.com/advisories/31146/

Limitations

Exploit works on WebLogic Server 10.0. On Windows Server 2003, patch KB933729 (rpcrt4.dll version 5.2.3790.4115) must be installed.

Platforms

Windows 2000
Windows Server 2003

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.8

Confidence

Low

EPSS

0.94

Percentile

99.2%