Bea Weblogic Apache Connector Buffer Overflow Vulnerability
Last Update Date:
28 Jan 2011
Release Date:
21 Jul 2008
5557
Views
RISK: Medium Risk
A vulnerability in Bea Weblogic, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the Apache connector and can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted POST request.
Impact
- Remote Code Execution
System / Technologies affected
- BEA WebLogic Server 10.x
- BEA WebLogic Server 5.x
- BEA WebLogic Server 6.x
- BEA WebLogic Server 7.x
- BEA WebLogic Server 8.x
- BEA WebLogic Server 9.x
Solutions
There is no patch available for this vulnerability currently.
Wordaround
Set the "LimitRequestLine" parameter to 4000 in "httpd.conf", or using the "mod_security" module.
Vulnerability Identifier
Source
Related Link
Share with