SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Oracle WebLogic Vendors:   BEA Systems
WebLogic Server May Let Applications Obtain Private Keys
SecurityTracker Alert ID:  1016095
SecurityTracker URL:  http://securitytracker.com/id/1016095
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 15 2006
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1 SP7, 7.0 SP6, 8.1 SP5, 9.0 9.1; and prior service packs
Description:   A vulnerability was reported in WebLogic Server. An application may be able to obtain private keys.

An application hosted on the target server can obtain the private keys. No further details were provided.

Impact:   An application may be able to obtain the private keys.
Solution:   The vendor has provided the following solution [quoted]:

WebLogic Server 9.1

* Use the Smart Update tool to install the patch for CR265510.

WebLogic Server 9.2 will include the functionality in this patch.

WebLogic Server 9.0

1. Install the 9.0 GA Combo patch from support.bea.com by requesting Bug ID CR239280.
2. Install the patch from:
ftp://ftpna.bea.com/pub/releases/security/CR265510_90.jar
3. Place the jar for the patch at the end of the PATCH_CLASSPATH.

WebLogic Server and WebLogic Express version 8.1

1. Upgrade to WebLogic Server and WebLogic Express 8.1 Service Pack 5.
2. Install the patch from:
ftp://ftpna.beasys.com/pub/releases/security/CR265510_810sp5.jar
3. Place the jar for the patch in the CLASSPATH before the weblogic.jar file.

WebLogic Server 8.1 Service Pack 6 will include the functionality in this patch.

WebLogic Server and WebLogic Express version 7.0

* Upgrade to service pack 7.

WebLogic Server and WebLogic Express version 6.1

1. Upgrade to WebLogic Server and WebLogic Express 6.1 Service Pack 7.
2. Install the patch from:
ftp://ftpna.beasys.com/pub/releases/security/CR265510_610sp7.jar
3. Place the jar for the patch in the CLASSPATH before the weblogic.jar file.

The vendor's advisory is available at:

http://dev2dev.bea.com/pub/advisory/186

Vendor URL:  dev2dev.bea.com/pub/advisory/186 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC