First published: Fri May 19 2006(Updated: )
BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =7.0-sp4 | |
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =8.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2462 is considered a high severity vulnerability due to the potential exposure of sensitive data.
To fix CVE-2006-2462, upgrade to BEA WebLogic Server 8.1 Service Pack 4 or 7.0 Service Pack 6 or later.
CVE-2006-2462 affects WebLogic Server 8.1 prior to Service Pack 4 and 7.0 prior to Service Pack 6.
CVE-2006-2462 exposes potentially sensitive network traffic transmitted over non-secure channels.
Yes, remote attackers can exploit CVE-2006-2462 to read sensitive data transmitted during JTA transactions.