Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache
allows intruders to execute arbitrary code or disrupt the normal
operation of Web Cache.
Defcom Labs has discovered a remotely exploitable buffer overflow
vulnerability in the Oracle9iAS Web Cache (on all platforms) that
allows intruders to either execute arbitrary code with the privileges
of the Web Cache process, or disrupt the normal operation of Web
Cache. The Oracle9iAS Web Cache provides four web services that are
all vulnerable and enabled by default when the software is
installed. For more information about these web services, please
see the Oracle9iAS
Web Cache Administration and Deployment Guide (registration required). These services and
the associated ports they listen on are listed below:
Additional information regarding this vulnerability is available at
Systems Affected
Systems running:
Overview
I. Description
II. Impact
An intruder can execute arbitrary code with the privileges of the web cache process or disrupt the normal operation of Web Cache. Additionally, an intruder might be able to intercept and/or modify sensitive data such as credentials and other types of sensitive information passing through the host running Web Cache. Finally, an intruder may be able to gain access to other systems by using Web Cache as an entry point into the network or by leveraging an existing trust relationship between Web Cache and another system.
III. Solution
Install a patch from Oracle. More information is available in Appendix
A.
This appendix contains information provided by vendors for this advisory. When vendors report new information to the CERT/CC, we
update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.
Please see http://otn.oracle.com/deploy/security/pdf/webcache.pdf Appendix A. - Vendor Information
Oracle
Appendix B. - References
- http://otn.oracle.com/deploy/security/pdf/webcache.pdf
- http://www.kb.cert.org/vuls/id/649979
- http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com
The CERT Coordination Center thanks Defcom Security, who discovered this vulnerability and published the information in their advisory. Additionally, we thank Oracle, who published an advisory on this issue.
Author: Ian A. Finlay.
Copyright 2001 Carnegie Mellon University.
Revision History
October 25, 2001: initial release