Oracle Fusion Middleware Oracle HTTP Server (Apr 2019 CPU)

critical Nessus Plugin ID 124156


The remote web server is affected by a stack-based buffer overflow vulnerability.


The version of Oracle HTTP Server installed on the remote host is affected by a stack-based buffer overflow as noted in the April 2019 CPU advisory. The condition exists in the included cURL library due to using unsigned math when preventing the overflow. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request, to cause a denial of service condition or the execution of arbitrary code.


Apply the appropriate patch according to the April 2019 Oracle Critical Patch Update advisory.

See Also

Plugin Details

Severity: Critical

ID: 124156

File Name: oracle_http_server_cpu_apr_2019.nasl

Version: 1.9

Type: local

Family: Web Servers

Published: 4/18/2019

Updated: 12/5/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2019-3822


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:fusion_middleware, cpe:/a:oracle:http_server

Required KB Items: Oracle/OHS/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 4/16/2019

Vulnerability Publication Date: 4/16/2019

Reference Information

CVE: CVE-2019-3822

BID: 106950

IAVA: 2019-A-0128

CEA-ID: CEA-2019-0227