First published: Tue Jun 11 2002(Updated: )
Buffer overflows in PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allow remote attackers to cause a denial of service or execute arbitrary code via (1) a long help page request without a dadname, which overflows the resulting HTTP Location header, (2) a long HTTP request to the plsql module, (3) a long password in the HTTP Authorization, (4) a long Access Descriptor (DAD) password in the addadd form, or (5) a long cache directory name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java System Application Server | =1.0.2 | |
Oracle Web Cache | =2.0.0.0 | |
Oracle Web Cache | =2.0.0.1 | |
Oracle Web Cache | =2.0.0.2 | |
Oracle Web Cache | =2.0.0.3 | |
Oracle Database | =8.1.7 | |
Oracle Database | =8.1.7.1 | |
Oracle Database | =9.0 | |
Oracle Database | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0559 is rated as a critical vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2002-0559, update your Oracle 9i Application Server and affected components to the latest patched version.
CVE-2002-0559 affects Oracle 9i Application Server 1.0.2.x, Oracle 9i version 9.0.1, and various versions of Oracle Application Server Web Cache.
Exploiting CVE-2002-0559 can lead to a denial of service or allow remote attackers to execute arbitrary code on the server.
As a temporary workaround for CVE-2002-0559, restrict access to the impacted services and monitor for unusual traffic patterns.