Vulnerability CVE-2008-3257


Published: 2008-07-22   Modified: 2012-02-12

Description:
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.

See advisories in our WLB2 database:
Topic
Author
Date
High
Oracle Weblogic Apache Connector POST Request Buffer Overflow
KingCope
19.05.2012

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Oracle -> Weblogic server 
Bea systems -> Apache connector in weblogic server 
Bea systems -> Weblogic server 
BEA -> Weblogic server 

 References:
http://www.kb.cert.org/vuls/id/716387
https://support.bea.com/application_content/product_portlets/securityadvisories/2793.html
http://xforce.iss.net/xforce/xfdb/43885
http://www.vupen.com/english/advisories/2008/2145/references
http://www.securitytracker.com/id?1020520
http://www.securityfocus.com/bid/30273
http://www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html
http://www.milw0rm.com/exploits/6089
http://www.attrition.org/pipermail/vim/2008-July/002036.html
http://www.attrition.org/pipermail/vim/2008-July/002035.html
http://secunia.com/advisories/31146
http://blogs.oracle.com/security/2008/07/security_alert_for_cve-2008-3257_released.html

Copyright 2022, cxsecurity.com

 

Back to Top