Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Publish Date: 21 lipca 2015
Severity: : Critical
CVE Kennungen: : CVE-2008-4008
Advisory Date: 21 lipca 2015
DESCRIPTION
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1002984
Trend Micro Deep Security DPI Rule Name: 1002984 - Oracle BEA WebLogic Server Apache Connector Buffer Overflow
AFFECTED SOFTWARE AND VERSION:
- oracle bea_product_suite 10.0
- oracle bea_product_suite 10.3
- oracle bea_product_suite 6.1
- oracle bea_product_suite 7.0
- oracle bea_product_suite 8.1
- oracle bea_product_suite 9.0
- oracle bea_product_suite 9.1
- oracle bea_product_suite 9.2