First published: Tue Jun 11 2002(Updated: )
The default configuration of the PL/SQL Gateway web administration interface in Oracle 9i Application Server 1.0.2.x uses null authentication, which allows remote attackers to gain privileges and modify DAD settings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Server | =1.0.2 | |
Oracle Application Server Web Cache | =2.0.0.0 | |
Oracle Application Server Web Cache | =2.0.0.1 | |
Oracle Application Server Web Cache | =2.0.0.2 | |
Oracle Application Server Web Cache | =2.0.0.3 | |
Oracle 8i | =8.1.7 | |
Oracle 8i | =8.1.7_.1 | |
Oracle Oracle9i | =9.0 | |
Oracle Oracle9i | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0561 is considered to have a high severity due to its potential for unauthorized access and privilege escalation.
To fix CVE-2002-0561, configure authentication for the PL/SQL Gateway web administration interface to prevent null authentication.
The impacts of CVE-2002-0561 can include unauthorized modification of DAD settings and potentially full control over the application server.
CVE-2002-0561 affects Oracle Application Server 1.0.2.x, Oracle Application Server Web Cache 2.0.0.x, and Oracle 8i and 9i versions.
Remote attackers can exploit CVE-2002-0561 to gain privileges and access sensitive configurations due to its null authentication vulnerability.