{"vuid":"VU#511194","idnumber":"511194","name":"Oracle9i Application Server MOD_ORADAV Module vulnerable to DoS","keywords":["oracle","oracle9i","Oracle9i Application Server","Litchfield","oradav"],"overview":"A remotely exploitable denial-of-service vulnerability exists in the Oracle9i Application Server MOD_ORADAV Module.","clean_desc":"Oracle has described this vulnerability as follows: A potential security vulnerability has been discovered in Oracle9i Application Server. A knowledgeable and malicious user can exploit exposed URLs: 1) http://host:port/dav_public, and 2) http://host:port/dav_portal, and compromise the MOD_ORADAV module that may result in a remote Denial of Service (DoS).","impact":"A remote attacker may be able to cause a denial-of-service against the Application Server.","resolution":"Oracle has published Oracle Security Alert #52 regarding this issue. Patches do not yet exist for all platforms. Please refer to Oracle Security Alert #52 for a detailed patch matrix.","workarounds":"Workarounds Until a patch can be applied, the CERT/CC recommends that vulnerable sites\ndisable unnecessary Oracle services\nrun Oracle services with the least privilege\nrestrict network access to Oracle services","sysaffected":"","thanks":"This vulnerability was discovered by David Litchfield and Mark Litchfield of \nNext Generation Security Software Ltd\n. The CERT/CC thanks both Next Generation Security Software Ltd and Oracle for providing information upon which this document is based.","author":"This document was written by Ian A Finlay.","public":["http://www.nextgenss.com/advisories/ora-appservfmtst.txt","http://otn.oracle.com/deploy/security/pdf/2003alert52.pdf"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-02-18T14:42:03Z","publicdate":"2003-02-11T00:00:00Z","datefirstpublished":"2003-02-18T15:07:32Z","dateupdated":"2003-02-19T15:46:20Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"10","cam_impact":"10","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"13.5","cam_scorecurrentwidelyknown":"15.609375","cam_scorecurrentwidelyknownexploited":"24.046875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.5,"vulnote":null}