File: 2559.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (71 lines) | stat: -rw-r--r-- 1,628 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Rule: 

--
Sid: 
2559

-- 
Summary: 
This event is generated when an attempt is made to exploit a known
vulnerability in Oracle Application Server Web Cache.

-- 

Impact: 
Serious. Possible execution of arbitrary code leading to remote
administrative access.

--
Detailed Information:
The Oracle Application Server Web Cache is vulnerable to a buffer
overrun caused by poor checking of the length of an HTTP Header. If a
large invalid HTTP Request Method is supplied to a vulnerable system, an
attacker may be presented with the opportunity to overrun a fixed length
buffer and subsequently execute code of their choosing on the server.

--
Affected Systems:
Oracle Application Server Web Cache 10g 9.0.4 .0
Oracle Oracle9i Application Server Web Cache 2.0 .0.4
Oracle Oracle9i Application Server Web Cache 9.0.2 .3
Oracle Oracle9i Application Server Web Cache 9.0.2 .2
Oracle Oracle9i Application Server Web Cache 9.0.3 .1

--

Attack Scenarios: 
An attacker might supply an HTTP Request Method of more than 432 bytes,
causing the overflow to occur.

-- 

Ease of Attack: 
Simple.

-- 

False Positives:
None Known

--
False Negatives:
This rule examines Oracle Web Cache server on port 7777 or 7778.  It is possible
to configure the Oracle Web Cache server to run on different ports.  The rule
should be configured to reflect the appropriate ports of Oracle Web Cache
servers on your network.

-- 

Corrective Action: 
Apply the appropriate vendor supplied patch

--
Contributors: 
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--