ID CVE-2007-0414
Summary BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, and 9.0 allows remote attackers to cause a denial of service (server hang) via certain requests that cause muxer threads to block when processing error pages.
References
Vulnerable Configurations
  • cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp7:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp7:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp7:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp7:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp7:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp7:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp6:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp6:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp6:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp6:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:express:*:*:*
    cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:express:*:*:*
  • cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp5:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp5:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:5.1:sp5:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:5.1:sp5:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:express:*:*:*
    cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:express:*:*:*
  • cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:8.1:sp5:win32:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:8.1:sp5:win32:*:*:*:*:*
  • cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 08-03-2011 - 02:49)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bea BEA07-141.00
bid 22082
osvdb 38506
sectrack 1017525
secunia 23750
vupen ADV-2007-0213
Last major update 08-03-2011 - 02:49
Published 23-01-2007 - 00:28
Last modified 08-03-2011 - 02:49
Back to Top