A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or cause the web cache process to hang or exit.
Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the process running the web cache process, or cause the web cache process to hang or crash entirely. The Oracle9iAS Web Cache provides four services that are enabled by default when the software is installed. These services and the associated ports they listen on are given below:
1100/tcp incoming web cache proxy
An intruder can execute arbitrary code with the privileges of the web cache process and/or cause the web cache process to hang or exit. Additionally, an intruder might be able to intercept and/or modify sensitive data traversing the web cache device such as credentials and other types of sensitive information.
Contact vendor for patches.
This document was written by Ian A. Finlay.