Child pages
  • CERT Advisory CA-2001-29 Oracle9iAS Web Cache vulnerable to buffer overflow

Pages in the Historical section of this site are provided for historical purposes, they are no longer maintained. Links may not work.

Skip to end of metadata
Go to start of metadata
Original release date: October 25, 2001
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

Systems running:
  • Oracle9iAS Web Cache


A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or disrupt the normal operation of Web Cache.

I. Description

Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the Web Cache process, or disrupt the normal operation of Web Cache. The Oracle9iAS Web Cache provides four web services that are all vulnerable and enabled by default when the software is installed. For more information about these web services, please see the Oracle9iAS Web Cache Administration and Deployment Guide (registration required). These services and the associated ports they listen on are listed below:

  • 1100/tcp (incoming web cache proxy)
  • 4000/tcp (administrative interface)
  • 4001/tcp (web XML invalidation port)
  • 4002/tcp (statistics port)

Additional information regarding this vulnerability is available at

II. Impact

An intruder can execute arbitrary code with the privileges of the web cache process or disrupt the normal operation of Web Cache. Additionally, an intruder might be able to intercept and/or modify sensitive data such as credentials and other types of sensitive information passing through the host running Web Cache. Finally, an intruder may be able to gain access to other systems by using Web Cache as an entry point into the network or by leveraging an existing trust relationship between Web Cache and another system.

III. Solution

Install a patch from Oracle. More information is available in Appendix A.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this advisory. When vendors report new information to the CERT/CC, we update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.


Please see

Appendix B. - References


The CERT Coordination Center thanks Defcom Security, who discovered this vulnerability and published the information in their advisory. Additionally, we thank Oracle, who published an advisory on this issue.

Author: Ian A. Finlay.

Copyright 2001 Carnegie Mellon University.

Revision History

October 25, 2001:  initial release
  • No labels