First published: Wed Nov 05 2003(Updated: )
The Administration Console for BEA Tuxedo 8.1 and earlier allows remote attackers to cause a denial of service (hang) via pathname arguments that contain MS-DOS device names such as CON and AUX.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Tuxedo | =8.0 | |
Oracle Tuxedo | =7.1 | |
Oracle WebLogic Server | =4.2 | |
Oracle Tuxedo | =6.5 | |
Oracle WebLogic Server | =5.1 | |
Oracle Tuxedo | =6.3 | |
Oracle Tuxedo | =6.4 | |
Oracle Tuxedo | =8.1 | |
Oracle WebLogic Server | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2003-0622 is classified as high due to its potential to cause a denial of service.
To mitigate CVE-2003-0622, it is advised to upgrade to BEA Tuxedo version 8.2 or later, which addresses this vulnerability.
CVE-2003-0622 affects BEA Tuxedo versions 6.3, 6.4, 6.5, 7.1, 8.0, and 8.1, as well as certain versions of Oracle WebLogic Server.
Yes, CVE-2003-0622 can be exploited remotely by sending specially crafted pathname arguments containing MS-DOS device names.
The impact of CVE-2003-0622 is a denial of service, leading to the affected application hanging and becoming unresponsive.