Oracle WebLogic Server mod_wl Invalid Parameter Remote Overflow (1150354)

This script is Copyright (C) 2008-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a module that is affected by a buffer
overflow vulnerability.

Description :

The remote web server is using the WebLogic plug-in for Apache
(mod_wl), an Apache module included with Oracle (formerly BEA)
WebLogic Server and used to proxy requests from an Apache HTTP server
to WebLogic.

The version of this plug-in on the remote host is affected by a stack
buffer overflow that is triggered when processing a request with an
invalid parameter. An unauthenticated, remote attacker can leverage
this issue to execute arbitrary code on the remote host.

Note that Nessus has not tried to exploit this issue but rather has
only checked the affected module's build timestamp.

See also :

http://www.nessus.org/u?e539ff75
http://www.securityfocus.com/archive/1/497969/30/0/threaded
http://www.nessus.org/u?e1bbe3e7

Solution :

Install the latest web server plug-in as described in the vendor
advisory above.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 34781 ()

Bugtraq ID: 31683
31761

CVE ID: CVE-2008-4008