First published: Tue Jun 11 2002(Updated: )
Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Oracle9i | =9.0.1 | |
Oracle Application Server Web Cache | =2.0.0.2 | |
Oracle Oracle9i | =9.0 | |
Oracle Oracle8i | =8.1.7.1 | |
Oracle Oracle8i | =8.1.7 | |
Oracle Application Server Web Cache | =2.0.0.1 | |
Oracle Application Server Web Cache | =2.0.0.0 | |
Oracle Application Server | =1.0.2 | |
Oracle Application Server Web Cache | =2.0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.