[NEWS] Oracle9iAS Web Cache Overflow Vulnerability (Patch)From: email@example.com
- Previous message: firstname.lastname@example.org: "[TOOL] Sharefuzz, Automatic Enviroment Variables Overflow Detector"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: email@example.com To: firstname.lastname@example.org Subject: [NEWS] Oracle9iAS Web Cache Overflow Vulnerability (Patch) Message-Id: <20011027123416.98898138BF@mail.der-keiler.de> Date: Sat, 27 Oct 2001 14:34:16 +0200 (CEST)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
Oracle9iAS Web Cache Overflow Vulnerability (Patch)
A potential security vulnerability has been discovered in Oracle9iAS Web
Cache 18.104.22.168. This vulnerability enables an attacker to mount a
denial-of-service attack using an oversized HTTP GET request. On some
platforms there is an additional vulnerability that may allow remote
execution of arbitrary code.
For more information, see our previous article:
<http://www.securiteam.com/exploits/6P00L002UA.html> Oracle9iAS Web Cache
Multiple DoS and Buffer Overflow
Oracle9iAS Web Cache 22.214.171.124
Oracle has comprehensively fixed this security vulnerability in the
126.96.36.199 release of Oracle9iAS Web Cache. Supported customers may download
the release for their platform from Oracle's Worldwide Support web site,
Metalink, <http://metalink.oracle.com> http://metalink.oracle.com. Press
the "Patches" button to get to the patches web page. Enter the platform
and corresponding patch number from the table below, and press "Submit."
Platform patch number:
MS Windows NT/2000 Server - 2044682
Sun SPARC Solaris - 2042106
HP-UX - 2043908
Linux - 2043924
Compaq Tru64 UNIX - 2043921
AIX - 2043917
Alternatively, this release may be downloaded for evaluation on Windows
NT, Solaris, HP, and Linux from the Oracle Technology Network,
The information has been provided by <mailto:email@example.com>
Oracle Security Alerts.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.