Vulnerability Note VU#649979
Oracle9iAS Web Cache vulnerable to buffer overflow
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or cause the web cache process to hang or exit.
Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the process running the web cache process, or cause the web cache process to hang or crash entirely. The Oracle9iAS Web Cache provides four services that are enabled by default when the software is installed. These services and the associated ports they listen on are given below:
1100/tcp incoming web cache proxy
An intruder can execute arbitrary code with the privileges of the web cache process and/or cause the web cache process to hang or exit. Additionally, an intruder might be able to intercept and/or modify sensitive data traversing the web cache device such as credentials and other types of sensitive information.
Contact vendor for patches.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle Corporation||Affected||-||25 Oct 2001|
CVSS Metrics (Learn More)
This document was written by Ian A. Finlay.
- CVE IDs: CVE-2001-0836
- CERT Advisory: CA-2001-29
- Date Public: 18 Oct 2001
- Date First Published: 25 Oct 2001
- Date Last Updated: 09 Apr 2003
- Severity Metric: 30.37
- Document Revision: 57
If you have feedback, comments, or additional information about this vulnerability, please send us email.