Original release date: October 25, 2001<BR>
Last revised: --<BR>
Source: CERT/CC<BR>

<P>A complete revision history can be found at the end of this file.

<A NAME="affected">
<H3>Systems Affected</H3>

Systems running:
<UL>
<LI>Oracle9iAS Web Cache 
</UL>


<A NAME="overview">
<H2>Overview</H2>

<P>
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache
allows intruders to execute arbitrary code or disrupt the normal
operation of Web Cache.
</P>

<A NAME="description">
<H2>I. Description</H2> 

<P>

Defcom Labs has discovered a remotely exploitable buffer overflow
vulnerability in the Oracle9iAS Web Cache (on all platforms) that
allows intruders to either execute arbitrary code with the privileges
of the Web Cache process, or disrupt the normal operation of Web
Cache. The Oracle9iAS Web Cache provides four web services that are
all vulnerable and enabled by default when the software is
installed. For more information about these web services, please
see the <A
href="http://otn.oracle.com/docs/products/ias/doc_library/1022doc_otn/caching.102/a90372/setup.htm#1008015">Oracle9iAS
Web Cache Administration and Deployment Guide</a><i> (registration required)</i>. These services and
the associated ports they listen on are listed below:

<ul>
<li>1100/tcp (incoming web cache proxy)</li>
<li>4000/tcp (administrative interface)</li>
<li>4001/tcp (web XML invalidation port)</li>
<li>4002/tcp (statistics port)</li>
</ul>

<p>Additional information regarding this vulnerability is available at

<dl>
<dd>
<A href="http://otn.oracle.com/deploy/security/pdf/webcache.pdf">http://otn.oracle.com/deploy/security/pdf/webcache.pdf</a>
<dd>
<a href="http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com">http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com</a>
</p>
</dd>
</dl>

<A NAME="impact">
<H2>II. Impact</H2>

<p>

An intruder can execute arbitrary code with the privileges of the web
cache process or disrupt the normal operation of Web
Cache. Additionally, an intruder might be able to intercept and/or
modify sensitive data such as credentials and other types of sensitive
information passing through the host running Web Cache. Finally, an
intruder may be able to gain access to other systems by using Web
Cache as an entry point into the network or by leveraging an existing
trust relationship between Web Cache and another system.

</p>

<A NAME="solution">
<H2>III. Solution</H2>

<p>

Install a patch from Oracle. More information is available in Appendix
A.


<A NAME="vendors">
<H2>Appendix A. - Vendor Information</H2>

<P>This appendix contains information provided by vendors for this advisory.  When vendors report new information to the CERT/CC, we
update this section and note the changes in our revision history.  If a particular vendor is not listed below, we have not received their comments.</P>

<p>
<A NAME="oracle">
<H4>Oracle</H4>
<p>Please see <A href="http://otn.oracle.com/deploy/security/pdf/webcache.pdf">http://otn.oracle.com/deploy/security/pdf/webcache.pdf</a> </p>
<!-- end vendor -->

</p>

<A NAME="references"><H2>Appendix B. - References</H2></A>

<ol>
<li><A href="http://otn.oracle.com/deploy/security/pdf/webcache.pdf">http://otn.oracle.com/deploy/security/pdf/webcache.pdf</a>
<li><a href="http://www.kb.cert.org/vuls/id/649979">http://www.kb.cert.org/vuls/id/649979</a><br>
<li><a href="http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com">http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com</a><BR>
</ol>
	
<HR>

<HR NOSHADE>

<P>The CERT Coordination Center thanks Defcom Security, who discovered
this vulnerability and published the information in their
advisory. Additionally, we thank Oracle, who published an advisory on
this issue.

</P>

<P></P>

<HR NOSHADE>

<P>Author: <A
HREF="mailto:cert@cert.org?subject=CA-2001-29%20Feedback%20VU%23649979">Ian
A. Finlay.</A>

<P></P>

<!--#include virtual="/include/footer_nocopyright.html" -->

<P>Copyright 2001 Carnegie Mellon University.</P>

<P>Revision History
<PRE>
October 25, 2001:  initial release
</PRE>