SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Oracle WebLogic Vendors:   Oracle
Oracle WebLogic Server and Portal Bugs Let Remote Users Access and Modify Data and Cause Denial of Service Conditions
SecurityTracker Alert ID:  1022059
SecurityTracker URL:  http://securitytracker.com/id/1022059
CVE Reference:   CVE-2009-1001, CVE-2009-1002, CVE-2009-1003, CVE-2009-1004, CVE-2009-1005, CVE-2009-1006, CVE-2009-1012, CVE-2009-1016   (Links to External Site)
Date:  Apr 14 2009
Impact:   Denial of service via local system, Denial of service via network, Disclosure of user information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0 SP7, 8.1 SP6, 9.2 MP3, 10.3 GA; and prior versions
Description:   Several vulnerabilities were reported in Oracle WebLogic Portal and Server. A remote or local user can access and modify data on the target system. A remote or local user can cause denial of service conditions.

A remote or local user can affect the confidentiality and integrity of data on the target system.

A remote or local user can cause unspecified denial of service conditions.

No details were provided.

The Oracle Data Service Integrator and AquaLogic Data Services Platform and Oracle JRockit products are affected.

The following researchers reported these and other Oracle vulnerabilities:

Dyon Balding of Secunia Research; Joshua J. Drake of iDefense; Gerhard Eschelbeck of Qualys, Inc.; Esteban Martinez Fayo of Application Security, Inc.; Franz Huell of Red Database Security; Mike Janowski of Neohapsis, Inc.; Joxean Koret; Joxean Koret of TippingPoint (3com); Alexander Kornbrust of Red Database Security; David Litchfield of NGS Software; Tanel Poder; Sven Vetter of Trivadis; and Dennis Yurichev.

Impact:   A remote user or local user can access and modify data on the target system.

A remote or local user can cause denial of service conditions.

Solution:   The vendor has issued a fix, described in their April 2009 Critical Patch Update advisory.

The vendor's advisory is available at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

Vendor URL:  www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC