Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Publish Date: 21 juillet 2015
Gravité: : Critique
Identifiant(s) CVE: : CVE-2008-4008
Date du conseil: 21 juillet 2015
Description
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1002984
Trend Micro Deep Security DPI Rule Name: 1002984 - Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Affected software and version:
- oracle bea_product_suite 10.0
- oracle bea_product_suite 10.3
- oracle bea_product_suite 6.1
- oracle bea_product_suite 7.0
- oracle bea_product_suite 8.1
- oracle bea_product_suite 9.0
- oracle bea_product_suite 9.1
- oracle bea_product_suite 9.2