Skip to main content

Bea Weblogic Apache Connector Buffer Overflow Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 21 Jul 2008 4809 Views

RISK: Medium Risk

A vulnerability in Bea Weblogic, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the Apache connector and can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted POST request.


Impact

  • Remote Code Execution

System / Technologies affected

  • BEA WebLogic Server 10.x
  • BEA WebLogic Server 5.x
  • BEA WebLogic Server 6.x
  • BEA WebLogic Server 7.x
  • BEA WebLogic Server 8.x
  • BEA WebLogic Server 9.x

Solutions

There is no patch available for this vulnerability currently.

Wordaround
Set the "LimitRequestLine" parameter to 4000 in "httpd.conf", or using the "mod_security" module.


Vulnerability Identifier


Source


Related Link