BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
BID:2138
Info
BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
| Bugtraq ID: | 2138 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2001-0098 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Dec 19 2000 12:00AM |
| Updated: | Jul 11 2009 04:46AM |
| Credit: | Posted to Bugtraq on December 19, 2000 by Peter Gründl <[email protected]>. |
| Vulnerable: |
BEA Systems Weblogic Server 5.1 x BEA Systems Weblogic Server 4.5 x BEA Systems Weblogic Server 4.0 x |
| Not Vulnerable: |
BEA Systems Weblogic Server 5.1 SP 7 |
Discussion
BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
BEA Systems WebLogic Server is an enterprise level web and wireless application server.
Unchecked buffers exist in a particular handler for URL requests that begin with two dots "..". Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality.
BEA Systems WebLogic Server is an enterprise level web and wireless application server.
Unchecked buffers exist in a particular handler for URL requests that begin with two dots "..". Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality.
Exploit / POC
BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
..<overly long string of characters>
..<overly long string of characters>
References
BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
References:
References:
- WebLogic Server Product Homepage (Oracle)