First published: Tue Jun 11 2002(Updated: )
The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Oracle9i | =9.0.1 | |
Oracle Application Server Web Cache | =2.0.0.2 | |
Oracle Oracle9i | =9.0 | |
Oracle 8i | =8.1.7_.1 | |
Oracle 8i | =8.1.7 | |
Oracle Application Server Web Cache | =2.0.0.1 | |
Oracle Application Server Web Cache | =2.0.0.0 | |
Oracle Application Server | =1.0.2 | |
Oracle Application Server Web Cache | =2.0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0563 is considered a critical vulnerability due to its ability to allow unauthorized access to sensitive services.
To fix CVE-2002-0563, configure the Oracle 9i Application Server to require authentication for sensitive services.
CVE-2002-0563 affects multiple Oracle 9i Application Server and Oracle Application Server Web Cache versions.
Yes, CVE-2002-0563 can be exploited remotely by anonymous users.
A potential workaround for CVE-2002-0563 is to restrict network access to the affected services.