Oracle WebLogic Server mod_wl Invalid Parameter Remote Overflow (1150354)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote web server uses a module that is affected by a buffer
overflow vulnerability.

Description :

The remote web server is using the WebLogic plug-in for Apache
(mod_wl), an Apache module included with Oracle (formerly BEA)
WebLogic Server and used to proxy requests from an Apache HTTP server
to WebLogic.

The version of this plug-in on the remote host is affected by a stack
buffer overflow that is triggered when processing a request with an
invalid parameter. An unauthenticated, remote attacker can leverage
this issue to execute arbitrary code on the remote host.

Note that Nessus has not tried to exploit this issue but rather has
only checked the affected module's build timestamp.

See also :

Solution :

Install the latest web server plug-in as described in the vendor
advisory above.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 34781 ()

Bugtraq ID: 31683

CVE ID: CVE-2008-4008

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now