The WebLogic Apache Connector is "module for the Apache httpd server. It is used to proxy requests from Apache to a backend WebLogic server". Remote exploitation of a stack based buffer overflow vulnerability in Oracle Corp.'s WebLogic Server Apache Connector could allow an attacker to execute arbitrary code with the privileges of the affected service.
* WebLogic Server Apache Connector version 10.0
A stack based buffer overflow vulnerability exists in the Apache Connector of Oracle (formerly BEA) WebLogic Server. When parsing a request with an invalid parameter the module uses a string without properly validating its length. This string is copied into a fixed sized stack buffer. This results in a stack based buffer overflow.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the affected service, usually SYSTEM. The vulnerability is a stack based buffer overflow, and many of the modules are not compiled with SAFESEH enabled, so it is trivial to exploit resulting in attacker supplied code being executed.
Editing the httpd.conf file and adding 'LimitRequestFieldsize 4000' in the global configuration area will prevent exploitation. However, users will be unable to submit request parameters that are longer than 4000 bytes.