Lucene search

K
saintSAINT CorporationSAINT:B9FC881966A71AF98F59E5D20BA2A052
HistoryJul 25, 2008 - 12:00 a.m.

Oracle WebLogic Server Apache Connector POST buffer overflow

2008-07-2500:00:00
SAINT Corporation
download.saintcorporation.com
20

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.933 High

EPSS

Percentile

99.1%

Added: 07/25/2008
CVE: CVE-2008-3257
BID: 30273
OSVDB: 47096

Background

Oracle WebLogic Server (formerly BEA WebLogic Server) is a Java web application platform.

Problem

A buffer overflow in the Apache Connector for WebLogic Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted POST request.

Resolution

Apply a fix when available.

References

<http://secunia.com/advisories/31146/&gt;

Limitations

Exploit works on WebLogic Server 10.0. On Windows Server 2003, patch KB933729 (rpcrt4.dll version 5.2.3790.4115) must be installed.

Platforms

Windows 2000
Windows Server 2003

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.933 High

EPSS

Percentile

99.1%