ID CVE-2008-4008
Summary Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:bea_product_suite:9.2:mp3
    cpe:2.3:a:oracle:bea_product_suite:9.2:mp3
  • cpe:2.3:a:oracle:bea_product_suite:9.1
    cpe:2.3:a:oracle:bea_product_suite:9.1
  • cpe:2.3:a:oracle:bea_product_suite:9.0
    cpe:2.3:a:oracle:bea_product_suite:9.0
  • cpe:2.3:a:oracle:bea_product_suite:8.1:sp6
    cpe:2.3:a:oracle:bea_product_suite:8.1:sp6
  • cpe:2.3:a:oracle:bea_product_suite:7.0:sp7
    cpe:2.3:a:oracle:bea_product_suite:7.0:sp7
  • cpe:2.3:a:oracle:bea_product_suite:6.1:sp7
    cpe:2.3:a:oracle:bea_product_suite:6.1:sp7
  • cpe:2.3:a:oracle:bea_product_suite:10.0:mp1
    cpe:2.3:a:oracle:bea_product_suite:10.0:mp1
  • cpe:2.3:a:oracle:bea_product_suite:10.3
    cpe:2.3:a:oracle:bea_product_suite:10.3
CVSS
Base: 10.0 (as of 15-10-2008 - 14:17)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description BEA Weblogic Transfer-Encoding Buffer Overflow. CVE-2008-4008. Remote exploit for windows platform
id EDB-ID:16796
last seen 2016-02-02
modified 2010-07-08
published 2010-07-08
reporter metasploit
source https://www.exploit-db.com/download/16796/
title BEA Weblogic Transfer-Encoding Buffer Overflow
metasploit via4
description This module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. This vulnerability exists in the error reporting for unknown Transfer-Encoding headers. You may have to run this twice due to timing issues with handlers.
id MSF:EXPLOIT/WINDOWS/HTTP/BEA_WEBLOGIC_TRANSFER_ENCODING
last seen 2018-08-24
modified 2017-07-24
published 2008-10-22
reliability Great
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb
title BEA Weblogic Transfer-Encoding Buffer Overflow
nessus via4
NASL family Web Servers
NASL id WEBLOGIC_MOD_WL_1150354.NASL
description The remote web server is using the WebLogic plug-in for Apache (mod_wl), an Apache module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an Apache HTTP server to WebLogic. The version of this plug-in on the remote host is affected by a stack buffer overflow that is triggered when processing a request with an invalid parameter. An unauthenticated, remote attacker can leverage this issue to execute arbitrary code on the remote host. Note that Nessus has not tried to exploit this issue but rather has only checked the affected module's build timestamp.
last seen 2019-01-16
modified 2018-11-15
plugin id 34781
published 2008-11-16
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=34781
title Oracle WebLogic Server mod_wl Invalid Parameter Remote Overflow (1150354)
packetstorm via4
data source https://packetstormsecurity.com/files/download/83221/bea_weblogic_transfer_encoding.rb.txt
id PACKETSTORM:83221
last seen 2016-12-05
published 2009-11-26
reporter Pusscat
source https://packetstormsecurity.com/files/83221/BEA-Weblogic-Transfer-Encoding-Buffer-Overflow.html
title BEA Weblogic Transfer-Encoding Buffer Overflow
refmap via4
confirm http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html
idefense 20081029 Oracle WebLogic Apache Connector
sectrack 1021056
vupen ADV-2008-2825
saint via4
bid 31683
description Oracle WebLogic Server Apache Connector Transfer-Encoding buffer overflow
id web_dev_weblogicapachever
osvdb 49283
title weblogic_apache_connector_transfer_encoding
type remote
Last major update 22-10-2012 - 22:53
Published 14-10-2008 - 17:11
Back to Top