The CERT/CC is aware of a report about "several remotely exploitable buffer overflow vulnerabilities in the Oracle Web Cache Server" that could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the Web Cache process.
The Oracle Web Cache acts as a reverse proxy, caching static and dynamic content generated from Oracle Application web servers. The CERT/CC is aware of a report of several buffer overflow vulnerabilities in the Oracle Web Cache. The report implies that the vulnerabilities exist in the Oracle Web Cache Manager, which is a web-based administration interface for the Oracle Web Cache. Further details about these vulnerabilities are not presently available, as the reporter (NGSSoftware) has intentionally released limited information in accordance with their disclosure policy. NGSSoftware reports that Oracle9iAS v18.104.22.168 for Windows NT/2000 was tested.
An unauthenticated remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The Oracle Web Cache may run as SYSTEM on Windows NT and Windows 2000 systems.
Apply a Patch
The CERT/CC thanks David Litchfield of NGSSoftware for information used in this document.
This document was written by Art Manion
|Date First Published:||2002-06-04|
|Date Last Updated:||2002-11-15 21:55 UTC|