Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Data de publicação: 21 julho 2015
Schweregrad: : Crítico
Identificador(es) CVE: : CVE-2008-4008
Data do informe: 21 julho 2015
Descrição
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
Exposição das informações
Apply associated Trend Micro DPI Rules.
Solução
Trend Micro Deep Security DPI Rule Number: 1002984
Trend Micro Deep Security DPI Rule Name: 1002984 - Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Software infectado e versão:
- oracle bea_product_suite 10.0
- oracle bea_product_suite 10.3
- oracle bea_product_suite 6.1
- oracle bea_product_suite 7.0
- oracle bea_product_suite 8.1
- oracle bea_product_suite 9.0
- oracle bea_product_suite 9.1
- oracle bea_product_suite 9.2