Vulnerabilities > CVE-2001-0836 - Unspecified vulnerability in Oracle Application Server web Cache 2.0.0.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
oracle
nessus
exploit available

Summary

Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Exploit-Db

descriptionOracle9iAS Web Cache 2.0 Buffer Overflow Vulnerability. CVE-2001-0836. Remote exploit for windows platform
idEDB-ID:21121
last seen2016-02-02
modified2001-10-18
published2001-10-18
reporterandreas
sourcehttps://www.exploit-db.com/download/21121/
titleOracle9iAS Web Cache 2.0 - Buffer Overflow Vulnerability

Nessus

  • NASL familyDatabases
    NASL idORACLE9IAS_TOO_LONG_URL.NASL
    descriptionIt may be possible to make the Oracle9i application server crash or execute arbitrary code by sending it a too long url specially crafted URL.
    last seen2020-06-01
    modified2020-06-02
    plugin id11081
    published2002-08-14
    reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11081
    titleOracle Application Server Web Cache HTTP Request Overflow
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # References:
    # Date:  Thu, 18 Oct 2001 16:16:20 +0200
    # From: "andreas junestam" <[email protected]>
    # Affiliation: Defcom
    # To: "bugtraq" <[email protected]>
    # Subject: def-2001-30
    #
    # Affected:
    # Oracle9iAS Web Cache/2.0.0.1.0
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(11081);
     script_version("1.30");
     script_cvs_date("Date: 2018/07/16 14:09:13");
    
     script_cve_id("CVE-2001-0836");
     script_bugtraq_id(3443);
    
     script_name(english:"Oracle Application Server Web Cache HTTP Request Overflow");
     script_summary(english:"Oracle9iAS buffer overflow");
    
     script_set_attribute(attribute:"synopsis", value:"It may be possible to execute arbitrary code on the remote system.");
     script_set_attribute(attribute:"description", value:
    "It may be possible to make the Oracle9i application server crash or
    execute arbitrary code by sending it a too long url specially crafted
    URL.");
     # http://web.archive.org/web/20041204191924/http://www.oracle.com/technology/deploy/security/pdf/webcache.pdf
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a96c1e5e");
     script_set_attribute(attribute:"solution", value:"Apply vendor-supplied patches.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2001/10/18");
     script_set_attribute(attribute:"patch_publication_date", value:"2001/10/18");
     script_set_attribute(attribute:"plugin_publication_date", value:"2002/08/14");
    
     script_set_attribute(attribute:"potential_vulnerability", value:"true");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_server_web_cache");
     script_end_attributes();
    
    
     script_category(ACT_DESTRUCTIVE_ATTACK);
     script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
     script_family(english:"Databases");
    
     script_dependencie("find_service1.nasl", "http_version.nasl");
     script_require_keys("Settings/ParanoidReport");
     script_require_ports("Services/www", 1100, 4000, 4001, 4002);
    
     exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    ports = add_port_in_list(list:get_kb_list("Services/www"), port:1100);
    ports = add_port_in_list(list:ports, port:4000);
    ports = add_port_in_list(list:ports, port:4001);
    ports = add_port_in_list(list:ports, port:4002);
    
    foreach port (ports)
    {
     if(!http_is_dead(port:port))
     {
      url = string("/", crap(data: "A", length: 3095), crap(data: "N", length: 4));
      w = http_send_recv3(method:"GET", item: url, port: port);
      if(http_is_dead(port: port, retry:1)) {
    	security_hole(port);
    	set_kb_item(name:"www/too_long_url_crash", value:TRUE);
      }
     }
    }
    
    # Note: sending 'GET /<3571 x A> HTTP/1.0' will kill it too.
    
  • NASL familyWeb Servers
    NASL idWWW_TOO_LONG_URL.NASL
    descriptionThe remote web server crashes when it receives a too long URL. It might be possible to make it execute arbitrary code through this flaw.
    last seen2020-06-01
    modified2020-06-02
    plugin id10320
    published1999-06-22
    reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10320
    titleWeb Server Long URL Handling Remote Overflow DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # Some vulnerable servers:
    # SmallHTTP (All versions vulnerable: 2.x Stables, 3.x Latest beta 8)
    # OmniHTTPd v2.09 of Omnicron (www.omnicron.ca)
    # MyWebServer 1.02
    # atphttpd-0.4b ?
    # IBM Tivoli Management Framework < Currently Fixpack 2 or Patches 3.7.1-TMF-0066
    #   LCFD process - default port 9495)
    # IBM Tivoli Management Framework 3.6.x through 3.7.1 (fixed in 4.1)
    #   Spider process - default port 94 redirected to another port.
    # Lucent Access Point IP Services Router (Formerly known as Xedia Router)
    # Oracle9iAS Web Cache/2.0.0.1.0
    # TelCondex SimpleWebServer 2.06.20817 Build 3128
    # WebServer 4 Everyone
    # WebServer 4 Everyone v1.28 (if Host field is set)
    # Savant Web Server 3.1 and previous
    # WN Server 1.18.2 through 2.0.0 (upgrade to 2.4.4)
    # Multitech RouteFinder 550 VPN  (upgrade to RF550VPN_V463)
    # Web Server 4D/eCommerce 3.5.3
    # ZBServer Pro 1.50-r13
    # BRS WebWeaver 1.03
    # U.S. Robotics Broadband-Router 8000A/8000-2 (USR848000A-02) running firmware version 2.5
    # Polycomm ViaVideo Web component 2.2 & 3.0
    # GazTek HTTP Daemon v1.4-3
    # WebFS 1.20
    # UltraVNC <= 1.0.1
    #
    ########################
    # References:
    ########################
    #
    # Date: Sat, 12 Oct 2002 07:49:52 +0200
    # From:"Marc Ruef" <[email protected]>
    # To:[email protected]
    # Subject: Long URL crashes My Web Server 1.0.2
    #
    # Date: Sun, 13 Oct 2002 15:00:18 +0200
    # From:"Marc Ruef" <[email protected]>
    # To:[email protected]
    # Subject: Long URL causes TelCondex SimpleWebServer to crash
    #
    # Date: Mon, 14 Oct 2002 08:27:54 +1300 (NZDT)
    # From:[email protected]
    # To:[email protected]
    # Subject: Security vulnerabilities in Polycom ViaVideo Web component
    #
    # From:"David Endler" <[email protected]>
    # To:[email protected]
    # Date: Tue, 15 Oct 2002 13:12:35 -0400
    # Subject: iDEFENSE Security Advisory 10.15.02: DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone
    #
    # Delivered-To: mailing list [email protected]
    # Date: Tue, 10 Sep 2002 15:39:02 -0700
    # Message-ID: <[email protected]>
    # From: "Foundstone Labs" <[email protected]>
    # To: "announce" <[email protected]>
    # Subject: Foundstone Labs Advisory - Buffer Overflow in Savant Web Server
    #
    # From:"David Endler" <[email protected]>
    # To: [email protected]
    # Date: Mon, 30 Sep 2002 10:09:59 -0400
    # Subject: iDEFENSE Security Advisory 09.30.2002: Buffer Overflow in WN Server
    #
    # From: "Tamer Sahin" <[email protected]>
    # To: [email protected]
    # Subject: Web Server 4D/eCommerce 3.5.3 DoS Vulnerability
    # Date: Tue, 15 Jan 2002 00:35:59 +0200
    # Affiliation: http://www.securityoffice.net
    #
    # From: "Tamer Sahin" <[email protected]>
    # To: [email protected]
    # Subject: ZBServer Pro DoS Vulnerability
    # Date: Tue, 15 Jan 2002 04:44:37 +0200
    # Affiliation: http://www.securityoffice.net
    #
    # Date:	 Mon, 14 Oct 2002 08:27:54 +1300 (NZDT)
    # From:	[email protected]
    # To:	[email protected]
    # Subject: Security vulnerabilities in Polycom ViaVideo Web component
    #
    # Date: Sat, 12 Oct 2002 17:02:31 -0700
    # To: [email protected]
    # Subject: Pyramid Research Project - ghttpd security advisorie
    # From: [email protected]
    #
    # Date: Tue Apr 04 2006 - 14:24:13 CDT
    # To: [email protected]
    # Subject: Buffer-overflow in Ultr@VNC 1.0.1 viewer and server
    # From: Luigi Auriemma (aluigiautistici.org)
    #
    ########################
    
    include("compat.inc");
    
    if (description)
    {
     script_id(10320);
     script_version("1.75");
     script_cvs_date("Date: 2018/08/07 16:46:51");
    
     script_cve_id(
      "CVE-2000-0002",
      "CVE-2000-0065",
      "CVE-2000-0571",
      "CVE-2000-0641",
      "CVE-2001-0820",
      "CVE-2001-0836",
      "CVE-2001-1250",
      "CVE-2002-0123",
      "CVE-2002-1003",
      "CVE-2002-1011",
      "CVE-2002-1012",
      "CVE-2002-1120",
      "CVE-2002-1166",
      "CVE-2002-1212",
      "CVE-2002-1905",
      "CVE-2002-2149",
      "CVE-2003-0125",
      "CVE-2003-0833",
      "CVE-2004-2299",
      "CVE-2005-1173",
      "CVE-2006-1652"
     );
     script_bugtraq_id(
      889,
      1423,
      2979,
      6994,
      7067,
      7280,
      8726,
      17378
     );
    
     script_name(english:"Web Server Long URL Handling Remote Overflow DoS");
     script_summary(english:"Web server buffer overflow");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server may be affected by a buffer overflow
    vulnerability.");
     script_set_attribute(attribute:"description", value:
    "The remote web server crashes when it receives a too long URL. It
    might be possible to make it execute arbitrary code through this flaw.");
     script_set_attribute(attribute:"solution", value:"Contact the web server's author / vendor for a patch.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'UltraVNC 1.0.1 Client Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
     script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
     script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");
    
     script_set_attribute(attribute:"potential_vulnerability", value:"true");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_DENIAL);
    # All the www_too_long_*.nasl scripts were first declared as
    # ACT_DESTRUCTIVE_ATTACK, but many web servers are vulnerable to them:
    # The web server might be killed by those generic tests before Nessus
    # has a chance to perform known attacks for which a patch exists
    # As ACT_DENIAL are performed one at a time (not in parallel), this reduces
    # the risk of false positives.
    
     script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
     script_family(english:"Web Servers");
    
     script_dependencie('http_version.nasl', 'www_multiple_get.nasl');
     script_require_keys("Settings/ParanoidReport");
     script_require_ports("Services/www",80);
    
     exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    port = get_http_port(default:80, embedded:1);
    
    if (http_is_dead(port:port))exit(1, "The web server on port "+port+" is dead");
    
    # Try to avoid FP on CISCO 7940 phone
    max = get_kb_item('www/multiple_get/'+port);
    if (max)
    {
     imax = max * 2 / 3;
     if (imax < 1)
      imax = 1;
     else if (imax > 5)
      imax = 5;
    }
    else
     imax = 5;
    debug_print('imax=',imax,'\n');
    
    # vWebServer and Small HTTP are vulnerable *if* the URL is requested
    # a couple of times. Ref: VULN-DEV & BUGTRAQ (2001-09-29)
    for (i = 0; i < imax; i = i + 1)
    {
     r = http_send_recv3(port: port, method: 'GET', item: strcat('/', crap(65535)));
    }
    
    
    if(http_is_dead(port: port, retry:3))
    {
    	security_hole(port);
    	set_kb_item(name:"www/too_long_url_crash", value:TRUE);
    }
    
  • NASL familyWeb Servers
    NASL idWWW_TOO_LONG_USERAGENT.NASL
    descriptionIt was possible to kill the web server by sending an invalid GET request with a long User-Agent field. A remote attacker may exploit this vulnerability to make the web server crash continually or possibly execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id11069
    published2002-08-13
    reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11069
    titleWeb Server HTTP User-Agent Header Handling Remote Overflow
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # Script audit and contributions from Carmichael Security
    #      Erik Anderson <[email protected]> (nb: domain no longer exists)
    #      Added BugtraqID and CVE
    #
    # References:
    # Date:  Thu, 18 Oct 2001 16:16:20 +0200
    # From: "andreas junestam" <[email protected]>
    # Affiliation: Defcom
    # To: "bugtraq" <[email protected]>
    # Subject: def-2001-30
    #
    # Affected:
    # Oracle9iAS Web Cache/2.0.0.1.0
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(11069);
     script_version("1.34");
     script_cvs_date("Date: 2018/11/15 20:50:26");
    
     script_cve_id("CVE-2001-0836");
     script_bugtraq_id(3443, 3449);
    
     script_name(english:"Web Server HTTP User-Agent Header Handling Remote Overflow");
     script_summary(english:"Tries to crash the web server with a long user-agent");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is running a web server with a remote buffer overflow
    vulnerability.");
     script_set_attribute(attribute:"description", value:
    "It was possible to kill the web server by sending an invalid GET
    request with a long User-Agent field. A remote attacker may exploit
    this vulnerability to make the web server crash continually or
    possibly execute arbitrary code.");
     script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=100395487007578&w=2");
     script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=100342151132277&w=2");
     script_set_attribute(attribute:"solution", value:"Upgrade your software or protect it with a filtering reverse proxy.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2001/10/18");
     script_set_attribute(attribute:"plugin_publication_date", value:"2002/08/13");
    
     script_set_attribute(attribute:"potential_vulnerability", value:"true");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_DENIAL);
    # All the www_too_long_*.nasl scripts were first declared as
    # ACT_DESTRUCTIVE_ATTACK, but many web servers are vulnerable to them:
    # The web server might be killed by those generic tests before Nessus
    # has a chance to perform known attacks for which a patch exists
    # As ACT_DENIAL are performed one at a time (not in parallel), this reduces
    # the risk of false positives.
    
     script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
     script_family(english:"Web Servers");
    
     script_dependencie("httpver.nasl", "http_version.nasl");
     script_require_keys("Settings/ParanoidReport");
     script_require_ports("Services/www", 80);
    
     exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    port = get_http_port(default:80, embedded:1);
    
    if(http_is_dead(port: port)) exit(0);
    
    r = http_send_recv3(method: "GET", item: "/", port: port,
     add_headers: make_array("User-Agent", crap(4000)));
    
    if (http_is_dead(port: port, retry: 3)) { security_hole(port);}