Vulnerability Note VU#649979

Oracle9iAS Web Cache vulnerable to buffer overflow

Original Release date: 25 Oct 2001 | Last revised: 09 Apr 2003


A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or cause the web cache process to hang or exit.


Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the process running the web cache process, or cause the web cache process to hang or crash entirely. The Oracle9iAS Web Cache provides four services that are enabled by default when the software is installed. These services and the associated ports they listen on are given below:

1100/tcp incoming web cache proxy
4000/tcp administrative interface
4001/tcp web XML invalidation port
4002/tcp statistics port

This vulnerability occurs in all four of the services listed above. For more information, see the Oracle Security Alert and/or the Defcom Labs Security Advisory. It is also important to note that an exploit exists and is publicly available for this vulnerability.


An intruder can execute arbitrary code with the privileges of the web cache process and/or cause the web cache process to hang or exit. Additionally, an intruder might be able to intercept and/or modify sensitive data traversing the web cache device such as credentials and other types of sensitive information.


Contact vendor for patches.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Oracle CorporationAffected-25 Oct 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This document was written by Ian A. Finlay.

Other Information

  • CVE IDs: CVE-2001-0836
  • CERT Advisory: CA-2001-29
  • Date Public: 18 Oct 2001
  • Date First Published: 25 Oct 2001
  • Date Last Updated: 09 Apr 2003
  • Severity Metric: 30.37
  • Document Revision: 57


If you have feedback, comments, or additional information about this vulnerability, please send us email.