First published: Tue Jun 11 2002(Updated: )
PL/SQL module 3.0.9.8.2 in Oracle 9i Application Server 1.0.2.x allows remote attackers to bypass authentication for a Database Access Descriptor (DAD) by modifying the URL to reference an alternate DAD that already has valid credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java System Application Server | =1.0.2 | |
Oracle Web Cache | =2.0.0.0 | |
Oracle Web Cache | =2.0.0.1 | |
Oracle Web Cache | =2.0.0.2 | |
Oracle Web Cache | =2.0.0.3 | |
Oracle Database | =8.1.7 | |
Oracle Database | =8.1.7.1 | |
Oracle Database | =9.0 | |
Oracle Database | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0564 is classified as a high severity vulnerability due to its ability to allow remote attackers to bypass authentication.
To fix CVE-2002-0564, ensure that your Oracle 9i Application Server and all related components are updated to the latest security patches provided by Oracle.
CVE-2002-0564 affects Oracle Application Server versions 1.0.2.x and Oracle Web Cache versions 2.0.0.x.
CVE-2002-0564 can be exploited by attackers to gain unauthorized access to sensitive data by modifying the URL to reference a Database Access Descriptor with valid credentials.
Disabling or restricting access to the vulnerable Database Access Descriptor can act as a temporary workaround for CVE-2002-0564 until a patch is successfully implemented.