Vulnerability Note VU#716387
Oracle Weblogic Apache connector vulnerable to buffer overflow
Oracle Weblogic (formerly BEA Weblogic) contains a vulnerability which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Oracle Weblogic Server and Weblogic Express applicaiton servers can be integrated with the Apache webserver using the Weblogic Apache connector plugin (mod_wl). A buffer overflow exists in Weblogic Server and Weblogic Express due to the way that the Apache connector plugin handles specially crafted POST requests. According to Oracle Security Advisory for CVE-2008-3257:
The following versions of WebLogic Server and WebLogic Express are affected by this vulnerability
A remote, unauthenticated attacker may be able to execute arbitrary code.
Apply a patch Patches have been released to address this issue. Refer to Oracle Security Advisory for CVE-2008-3257 for more information.
Install the mod_security module
Oracle suggests installing the mod_security module, which is available in open source from http://www.modsecurity.org/.
More information about these workarounds is provided in Oracle Security Advisory for CVE-2008-3257.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Oracle Corporation||Affected||-||29 Jul 2008|
CVSS Metrics (Learn More)
This vulnerabilty was reported by KingCope.
This document was written by Chris Taschner.
- CVE IDs: CVE-2008-3257
- Date Public: 21 Jul 2008
- Date First Published: 29 Jul 2008
- Date Last Updated: 06 Aug 2008
- Severity Metric: 17.32
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.