First published: Fri Dec 31 2004(Updated: )
The XML parser in Oracle 9i Application Server Release 2 9.0.3.0 and 9.0.3.1, 9.0.2.3 and earlier, and Release 1 1.0.2.2 and 1.0.2.2.2, and Database Server Release 2 9.2.0.1 and later, allows remote attackers to cause a denial of service (CPU and memory consumption) via a SOAP message containing a crafted DTD.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Oracle9i | =standard_9.0.1.4 | |
Oracle Oracle9i | =personal_9.2.0.1 | |
Oracle Oracle9i | =personal_9.2.0.2 | |
Oracle Oracle9i | =enterprise_9.2.0.2 | |
Oracle Oracle9i | =standard_9.2.0.1 | |
Oracle Application Server | =1.0.2.2.2 | |
Oracle Application Server | =9.0.3 | |
Oracle Oracle9i | =standard_9.2.0.2 | |
Oracle Application Server | =9.0.3.1 | |
Oracle Oracle9i | =personal_9.0.1.4 | |
Oracle Oracle9i | =enterprise_9.2.0.1 | |
Oracle Application Server | =1.0.2.2 | |
Oracle Oracle9i | =enterprise_9.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2244 is classified as a denial of service vulnerability that can lead to significant resource consumption.
To mitigate CVE-2004-2244, you should apply the appropriate patches provided by Oracle for the affected versions of their software.
CVE-2004-2244 affects Oracle 9i Application Server Release 2, earlier versions of Oracle 9i, and Oracle Database Server Release 2 versions 9.2.0.1 and later.
CVE-2004-2244 can be exploited via a specially crafted SOAP message that causes excessive CPU and memory usage.
Yes, CVE-2004-2244 can be exploited by remote attackers without requiring local access.