|
|
|
|
| |
Credit:
The information has been provided by iDefense.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=751
|
| |
Vulnerable Systems:
* WebLogic Server Apache Connector version 10.0
A stack based buffer overflow vulnerability exists in the Apache Connector of Oracle (formerly BEA) WebLogic Server. When parsing a request with an invalid parameter the module uses a string without properly validating its length. This string is copied into a fixed sized stack buffer. This results in a stack based buffer overflow.
Analysis:
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the affected service, usually SYSTEM. The vulnerability is a stack based buffer overflow, and many of the modules are not compiled with SAFESEH enabled, so it is trivial to exploit resulting in attacker supplied code being executed.
Workaround:
Editing the httpd.conf file and adding 'LimitRequestFieldsize 4000' in the global configuration area will prevent exploitation. However, users will be unable to submit request parameters that are longer than 4000 bytes.
Vendor response:
Oracle has released a Critical Patch Update (CPU) for October 2008 which addresses these issues. For more information, consult their advisory at the following URL.
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html
CVE Information:
CVE-2008-4008
Disclosure timeline:
07/31/2008 - Initial Vendor Notification
08/01/2008 - Initial Vendor Reply
08/29/2008 - Additional Vendor Feedback
10/29/2008 - Coordinated Public Disclosure
|
|
|
|
|