Korean
<< Back
VID 12027
Severity 40
Port 4001, ...
Protocol TCP
Class WWW
Detailed Description The Oracle9iAS Web Cache has a buffer overflow vulnerability via a long HTTP GET request.
Oracle9iAS Web Cache provides four services, which are enabled by default when the software is installed. The following describes theses services and the associated ports they listen on.

- incoming web cache proxy : 1100/tcp
- administrative interface : 4000/tcp
- web XML invalidation port : 4001/tcp
- statistics port : 4002/tcp

For Oracle9iAS Web Cache 2.0.0.1, the listed services have a buffer overflow vulnerability, arises when a remote attacker sends long specially crafted HTTP GET request with 3095 'A' characters and 4 'N' characters to the Web Cache server as the following:

GET /AAAA....['A'*3095]....AAAANNNN HTTP/1.0

Such request will cause the buffer to overflow on the server. This overflow can simply disrupt the normal operation of the Web Cache or execute arbitrary code with the privileges the Web Cache process. In the worse case, a remote attacker can intercept or modify sensitive data passing through the Web Cache server and gain access to other system by using Web Cache as an entry pointer into the network.

* References:
http://otn.oracle.com/deploy/security/pdf/webcache.pdf
http://www.securityfocus.com/bid/3443
http://www.iss.net/security_center/static/7306.php

* Platforms Affected :
Oracle9iAS Web Cache 2.0.0.1
Oracle9iAS Web Cache 2.0.0.2 on the Windows NT
Recommendation Upgrade to the Oracle9iAS Web Cache 2.0.0.2 or later fixed this vulnerability.

-- OR --

Apply the Patch from the Oracle's Metalink web site:
1. Go to the Oracle's Metalink web site - http://metalink.oracle.com
2. After logging into the Metalink, click the "Patches" button.
3. Enter the platforms and corresponding patch number as the following list and click the "submit" button.

MS-Windows NT/2000 Server - Patch #2044682
Sun SPARC Solaris - Patch #2042106
HP-UX - Patch #2043908
Linux - Patch #2043924
Compaq Tru64 UNIX - Patch #2043921
AIX - Patch #2043917
Related URL CVE-2001-0836 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)