CVE-2001-0098
CVSS10.0
发布时间 :2001-02-12 00:00:00
修订时间 :2008-09-05 16:23:15
NMCOES    

[原文]Buffer overflow in Bea WebLogic Server before 5.1.0 allows remote attackers to execute arbitrary commands via a long URL that begins with a ".." string.


[CNNVD]BEA WebLogic Server Double Dot缓冲区溢出漏洞(CNNVD-200102-057)

        Bea WebLogic Server 5.1.0版本存在缓冲区溢出漏洞。远程攻击者借助超长的以“..”字符串开始的URL执行任意命令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0098
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0098
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200102-057
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/5782.php
(VENDOR_ADVISORY)  XF  weblogic-dot-bo
http://www.securityfocus.com/bid/2138
(VENDOR_ADVISORY)  BID  2138
http://archives.neohapsis.com/archives/bugtraq/2000-12/0331.html
(PATCH)  BUGTRAQ  20001219 def-2000-04: Bea WebLogic Server dotdot-overflow

- 漏洞信息

BEA WebLogic Server Double Dot缓冲区溢出漏洞
危急 缓冲区溢出
2001-02-12 00:00:00 2007-05-04 00:00:00
远程※本地  
        Bea WebLogic Server 5.1.0版本存在缓冲区溢出漏洞。远程攻击者借助超长的以“..”字符串开始的URL执行任意命令。

- 公告与补丁

        BEA Systems has released WebLogic Server 5.1 SP 7 which is not susceptible to this vulnerability. It is available for download at the following location:
        http://commerce.beasys.com/downloads/weblogic_server.jsp

- 漏洞信息 (20516)

BEA Systems Weblogic Server 4.0 x/4.5 x/5.1 x Double Dot Buffer Overflow (EDBID:20516)
multiple remote
2000-12-19 Verified
0 peter.grundl
N/A [点击下载]
source: http://www.securityfocus.com/bid/2138/info


BEA Systems WebLogic Server is an enterprise level web and wireless application server.

Unchecked buffers exist in a particular handler for URL requests that begin with two dots "..". Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality. 

..<overly long string of characters> 		

- 漏洞信息

10067
BEA WebLogic Double Dot GET Request Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Unknown Vendor Verified

- 漏洞描述

- 时间线

2000-12-19 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

BEA WebLogic Server Double Dot Buffer Overflow Vulnerability
Boundary Condition Error 2138
Yes Yes
2000-12-19 12:00:00 2009-07-11 04:46:00
Posted to Bugtraq on December 19, 2000 by Peter Gründl <peter.grundl@defcom.com>.

- 受影响的程序版本

BEA Systems Weblogic Server 5.1 x
- Apache Software Foundation Apache 1.3.12
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
- C2Net StrongHold Web Server 3.0
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- IBM AIX 4.2
- Microsoft IIS 5.0
- Microsoft IIS 4.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 5.1
- Sun Solaris 8_sparc
BEA Systems Weblogic Server 4.5 x
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- IBM AIX 4.2
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 5.1
- Sun Solaris 8_sparc
BEA Systems Weblogic Server 4.0 x
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- IBM AIX 4.2
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 5.1
- Sun Solaris 8_sparc
BEA Systems Weblogic Server 5.1 SP 7
- Digital OpenVMS 7.1
- Digital (Compaq) TRU64/DIGITAL UNIX 5.0
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- IBM AIX 4.2
- IBM OS/390 V2R6
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 7.0
- SCO Unixware 7.1.1
- SGI IRIX 6.5.8
- Sun Solaris 8_sparc

- 不受影响的程序版本

BEA Systems Weblogic Server 5.1 SP 7
- Digital OpenVMS 7.1
- Digital (Compaq) TRU64/DIGITAL UNIX 5.0
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.3
- IBM AIX 4.2
- IBM OS/390 V2R6
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- RedHat Linux 7.0
- SCO Unixware 7.1.1
- SGI IRIX 6.5.8
- Sun Solaris 8_sparc

- 漏洞讨论

BEA Systems WebLogic Server is an enterprise level web and wireless application server.

Unchecked buffers exist in a particular handler for URL requests that begin with two dots "..". Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality.

- 漏洞利用

..&lt;overly long string of characters&gt;

- 解决方案

BEA Systems has released WebLogic Server 5.1 SP 7 which is not susceptible to this vulnerability. It is available for download at the following location:

http://commerce.beasys.com/downloads/weblogic_server.jsp

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站