{"vuid":"VU#413006","idnumber":"413006","name":"Oracle Application Server Web Cache contains heap overflow vulnerability","keywords":["Oracle","Application Server","Web Cache","heap overflow","HTTP Request Method header"],"overview":"Oracle Application Server Web Cache contains a heap overflow vulnerability in the handling of client requests that could result in arbitrary code execution.","clean_desc":"The Oracle Web Cache acts as a reverse proxy, caching static and dynamic content generated from Oracle Application web servers. There is a heap overflow vulnerability in the way Oracle Web Cache processes HTTP requests. By supplying an overly long HTTP Request Method header, an attacker could execute arbitrary code with privileges of the vulnerable process. According to Oracle: Web Cache must be running and configured to listen on the Oracle Application Server Web Cache listener port for any client request, regardless of the type of origin Web server (for example, Oracle HTTP Server, Apache or other web servers). If the client request is sent directly to origin Web server (i.e. Oracle HTTP Server, Apache or others), bypassing Web Cache, these vulnerabilities cannot be exploited. The following products are affected: Oracle Application Server Web Cache 10g (9.0.4.0.0)\nOracle9iAS Web Cache 9.0.3.1.0\nOracle9iAS Web Cache 9.0.2.3.0\nOracle9iAS Web Cache 2.0.0.4.0\nE-Business Suite 11i configured to use Oracle iStore 11i (11i.IBE.O and later) with Oracle Web Cache 9.0.2.2\nE-Business Suite 11i Early Adopter customers implementing MetaLink note 233436.1 should apply patches for Oracle Application Server 10g (9.0.4.0.0).","impact":"A remote, unauthenticated attacker could execute arbitrary code with privileges of the vulnerable process.","resolution":"Apply Patch\nOracle has published Oracle Security Alert #66 regarding this issue. For further information, please refer to MetaLink Document ID 265310.1 (login required).","workarounds":"","sysaffected":"","thanks":"Thanks to Ioannis Migadakis of \nInAccess Networks\n  for reporting this vulnerability.","author":"This document was written by Damon Morda.","public":["http://www.inaccessnetworks.com/ian/services/secadv01.txt","http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf","http://otn.oracle.com/deploy/security/pdf/oracle_severity_ratings.pdf","http://otn.oracle.com/products/ias/web_cache/index.html","http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=265310.1","http://secunia.com/advisories/11118/","http://www.ietf.org/rfc/rfc2616.txt"],"cveids":["CVE-2004-0385"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-15T15:06:06Z","publicdate":"2004-03-15T00:00:00Z","datefirstpublished":"2004-03-22T16:30:48Z","dateupdated":"2004-04-20T20:44:33Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"17","cam_scorecurrent":"20.3203125","cam_scorecurrentwidelyknown":"24.384375","cam_scorecurrentwidelyknownexploited":"40.640625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.3203125,"vulnote":null}