First published: Wed Dec 31 2003(Updated: )
Race condition in BEA WebLogic Server and Express 5.1 through 7.0.0.1, when using in-memory session replication or replicated stateful session beans, causes the same buffer to be provided to two users, which could allow one user to see session data that was intended for another user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =6.0 | |
Oracle WebLogic Server | =6.1 | |
Oracle WebLogic Server | =7.0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1438 is considered to be of high severity due to the potential for session data leakage between users.
To fix CVE-2003-1438, upgrade to a version of BEA WebLogic Server that is not affected by this vulnerability.
CVE-2003-1438 affects BEA WebLogic Server versions 5.1, 6.0, 6.1, and 7.0 through 7.0.0.1.
CVE-2003-1438 is a race condition vulnerability that can lead to unauthorized access to session data.
The potential consequences of CVE-2003-1438 include unauthorized access to sensitive session information by malicious users.