Vulnerabilities > CVE-2008-4008 - Unspecified vulnerability in Oracle BEA Product Suite
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Exploit-Db
description | BEA Weblogic Transfer-Encoding Buffer Overflow. CVE-2008-4008. Remote exploit for windows platform |
id | EDB-ID:16796 |
last seen | 2016-02-02 |
modified | 2010-07-08 |
published | 2010-07-08 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16796/ |
title | BEA Weblogic Transfer-Encoding Buffer Overflow |
Metasploit
description | This module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. This vulnerability exists in the error reporting for unknown Transfer-Encoding headers. You may have to run this twice due to timing issues with handlers. |
id | MSF:EXPLOIT/WINDOWS/HTTP/BEA_WEBLOGIC_TRANSFER_ENCODING |
last seen | 2020-05-26 |
modified | 2017-07-24 |
published | 2008-10-22 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4008 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb |
title | BEA Weblogic Transfer-Encoding Buffer Overflow |
Nessus
NASL family | Web Servers |
NASL id | WEBLOGIC_MOD_WL_1150354.NASL |
description | The remote web server is using the WebLogic plug-in for Apache (mod_wl), an Apache module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an Apache HTTP server to WebLogic. The version of this plug-in on the remote host is affected by a stack buffer overflow that is triggered when processing a request with an invalid parameter. An unauthenticated, remote attacker can leverage this issue to execute arbitrary code on the remote host. Note that Nessus has not tried to exploit this issue but rather has only checked the affected module |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34781 |
published | 2008-11-16 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/34781 |
title | Oracle WebLogic Server mod_wl Invalid Parameter Remote Overflow (1150354) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83221/bea_weblogic_transfer_encoding.rb.txt |
id | PACKETSTORM:83221 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | Pusscat |
source | https://packetstormsecurity.com/files/83221/BEA-Weblogic-Transfer-Encoding-Buffer-Overflow.html |
title | BEA Weblogic Transfer-Encoding Buffer Overflow |
Saint
bid | 31683 |
description | Oracle WebLogic Server Apache Connector Transfer-Encoding buffer overflow |
id | web_dev_weblogicapachever |
osvdb | 49283 |
title | weblogic_apache_connector_transfer_encoding |
type | remote |
Seebug
bulletinFamily exploit description CVE(CAN) ID: CVE-2008-4008 WebLogic包含多种应用系统集成方案,包括Server/Express/Integration等。 WebLogic的Apache连接器实现上存在漏洞,模块做处理请求所带的畸形参数时,未进行长度检查就把字符串拷贝到固定长度的栈缓冲区中,远程攻击者可能利用此漏洞触发栈溢出,导致执行任意指令。 Oracle WebLogic Server Oracle ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html target=_blank>http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html</a> id SSV:4398 last seen 2017-11-19 modified 2008-11-04 published 2008-11-04 reporter Root title Oracle WebLogic Apache连接器远程缓冲区溢出漏洞 bulletinFamily exploit description BUGTRAQ ID: 31683 CVE(CAN) ID: CVE-2008-4008,CVE-2008-4009,CVE-2008-4010,CVE-2008-4011,CVE-2008-4012,CVE-2008-4013,CVE-2008-4000,CVE-2008-4001,CVE-2008-4002,CVE-2008-4003,CVE-2008-4004,CVE-2008-3985,CVE-2008-3988,CVE-2008-3998,CVE-2008-3619,CVE-2008-3993,CVE-2008-3975,CVE-2008-3977,CVE-2008-3588,CVE-2008-3986,CVE-2008-3987,CVE-2008-3989,CVE-2008-2624,CVE-2008-3996,CVE-2008-3992,CVE-2008-3976,CVE-2008-3982,CVE-2008-3983,CVE-2008-3984,CVE-2008-3994,CVE-2008-3980,CVE-2008-4005,CVE-2008-2625,CVE-2008-3990,CVE-2008-3991 Oracle Database是一款商业性质大型数据库系统。 Oracle发布了2008年7月的紧急补丁更新公告,修复了多个Oracle产品中的多个漏洞。这些漏洞影响Oracle产品的所有安全属性,可导致本地和远程的威胁。其中一些漏洞可能需要各种级别的授权,但也有些不需要任何授权。最严重的漏洞可能导致完全入侵数据库系统。目前已知的漏洞包括: BEA WebLogic Workshop中有关NetUI标签的漏洞可能导致信息泄露。 BEA WebLogic Server在使用多个授权者(如XACMLAuthorizer和DefaultAuthorizer)时的错误可能允许绕过某些安全限制。 Apache的WebLogic插件中的错误可能导致完全的系统入侵。 将Bea WebLogic Server 8.1SP3升级到更高版本可能导致无效用户可以使用之前受保护的应用。成功攻击要求使用了CLIENT-CERT认证方式。 Oracle Application Server 9.0.4.3 Oracle Application Server 10.1.3.4.0 Oracle Application Server 10.1.3.0.0 Oracle Application Server 10.1.2.3.0 Oracle Application Server 10.1.2.2.0 Oracle E-Business Suite 12.0.4 Oracle E-Business Suite 11.5.10.2 Oracle Database 9.2.0.8DV Oracle Database 9.2.0.8 Oracle Database 11.1.0.6 Oracle Database 10.2.0.4 Oracle Database 10.2.0.3 Oracle Database 10.2.0.2 Oracle Database 10.1.0.5 Oracle JD Edwards EnterpriseOne Tools 8.98 Oracle JD Edwards EnterpriseOne Tools 8.97 Oracle PeopleSoft Enterprise PeopleTools 8.49.14 Oracle PeopleSoft Enterprise PeopleTools 8.48.18 Oracle WebLogic Server 9.2 Oracle WebLogic Server 9.1 Oracle WebLogic Server 9.0 Oracle WebLogic Server 8.1 Oracle WebLogic Server 7.0 Oracle WebLogic Server 6.1 Oracle WebLogic Server 10.0 Oracle PeopleSoft Enterprise Portal 9.0 Oracle PeopleSoft Enterprise Portal 8.9 Oracle Workshop for WebLogic 9.2 Oracle Workshop for WebLogic 9.1 Oracle Workshop for WebLogic 9.0 Oracle Workshop for WebLogic 8.1 Oracle Workshop for WebLogic 10.3 GA Oracle Workshop for WebLogic 10.2 GA Oracle Workshop for WebLogic 10.0 厂商补丁: Oracle ------ Oracle已经为此发布了一个安全公告(cpuoct2008)以及相应补丁: cpuoct2008:Oracle Critical Patch Update Advisory - October 2008 链接:<a href=http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html?_template=/o target=_blank>http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html?_template=/o</a> id SSV:4264 last seen 2017-11-19 modified 2008-10-20 published 2008-10-20 reporter Root title Oracle 2008年10月紧急补丁更新修复多个漏洞