{"vuid":"VU#649979","idnumber":"649979","name":"Oracle9iAS Web Cache vulnerable to buffer overflow","keywords":["Oracle9iAS Web Cache","DoS","denial of service","long string of characters","buffer overflow","oracle","Oracle"],"overview":"A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or cause the web cache process to hang or exit.","clean_desc":"Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the process running the web cache process, or cause the web cache process to hang or crash entirely. The Oracle9iAS Web Cache provides four services that are enabled by default when the software is installed. These services and the associated ports they listen on are given below: 1100/tcp incoming web cache proxy\n4000/tcp administrative interface\n4001/tcp web XML invalidation port\n4002/tcp statistics port This vulnerability occurs in all four of the services listed above. For more information, see the Oracle Security Alert and/or the Defcom Labs Security Advisory. It is also important to note that an exploit exists and is publicly available for this vulnerability.","impact":"An intruder can execute arbitrary code with the privileges of the web cache process and/or cause the web cache process to hang or exit. Additionally, an intruder might be able to intercept and/or modify sensitive data traversing the web cache device such as credentials and other types of sensitive information.","resolution":"Contact vendor for patches.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Ian A. Finlay.","public":["http://otn.oracle.com/deploy/security/pdf/webcache.pdf","http://www.securityfocus.com/archive/1/3BCEE434.F597D815@defcom.com","http://www.securityfocus.com/bid/3449"],"cveids":["CVE-2001-0836"],"certadvisory":"CA-2001-29","uscerttechnicalalert":null,"datecreated":"2001-10-25T12:56:37Z","publicdate":"2001-10-18T00:00:00Z","datefirstpublished":"2001-10-25T22:50:54Z","dateupdated":"2003-04-09T18:51:55Z","revision":57,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"18","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"30.375","cam_scorecurrentwidelyknown":"30.375","cam_scorecurrentwidelyknownexploited":"50.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.375,"vulnote":null}