WebLogic Bugs Let Remote Users Execute Arbitary Code, Acces and Modify Information, and Deny Service
|
SecurityTracker Alert ID: 1021571 |
SecurityTracker URL: http://securitytracker.com/id/1021571
|
CVE Reference:
CVE-2008-5457, CVE-2008-5459, CVE-2008-5460, CVE-2008-5461, CVE-2008-5462
(Links to External Site)
|
Updated: Apr 3 2009
|
Original Entry Date: Jan 14 2009
|
Impact:
Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.0 SP7, 8.1 SP6, 9.2 MP3, 10.3 GA; and prior versions
|
Description:
Several vulnerabilities were reported in WebLogic. A remote user can execute arbitrary code on the target system. A remote user can access and modify data on the target system. A remote user can cause denial of service conditions.
A remote user can send specially crafted data to trigger a flaw in the WebLogic Server Plugins for Apache, Sun, and IIS web servers and execute arbitrary code on the target system [CVE-2008-5457].
Some demonstration exploit code is available at:
http://milw0rm.com/exploits/8336
Other vulnerabilities exist in WebLogic Server and WebLogic Portal.
A remote user can affect the confidentiality and integrity of data on the target system.
A remote user can cause unspecified denial of service conditions.
No details were provided.
The following researchers reported these and other Oracle vulnerabilities:
Deniz Cevik of Intellect; Andy Davis of Information Risk Management Plc (IRM Plc); Esteban Martinez Fayo of Application Security, Inc.; Franz Huell of Red Database Security; Wasim Iqbal; Joxean Koret; Joxean Koret of TippingPoint (3com); Alexander Kornbrust of Red Database Security; Sasa Kos of ACROS Security; Code Audit Labs of iDefense; David Litchfield of NGS Software; Zhenhua Liu of Fortinet, Inc.; Andy Sch. of Centre for the Protection of National Infrastructure; Daiki Fukumori [Secure Sky Technology] of JPCERT/CC Vulnerability Handling Team; Geoff Whittington of Assurent Secure Technologies; and Xiaopeng Zhang of Fortinet, Inc.
|
Impact:
A remote user can execute arbitrary code on the target system.
A remote user can access and modify data on the target system.
A remote user can cause denial of service conditions.
|
Solution:
The vendor has issued a fix, described in their January 2009 Critical Patch Update advisory.
The vendor's advisory is available at:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
|
Vendor URL: www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html (Links to External Site)
|
Cause:
Not specified
|
Underlying OS: Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|