First published: Mon Mar 03 2003(Updated: )
Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Server | =9.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0842 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2002-0842, it is recommended to upgrade to a patched version of Oracle Application Server that addresses the vulnerability.
CVE-2002-0842 specifically affects Oracle Application Server version 9.0.2 among other third party modifications to mod_dav.
Yes, CVE-2002-0842 can be exploited remotely by sending a specially crafted URI that triggers a format string vulnerability.
Exploiting CVE-2002-0842 could allow attackers to execute arbitrary code on affected systems, leading to a complete compromise.