First published: Fri Aug 31 2007(Updated: )
The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =7.0-sp7 | |
BEA Weblogic Server | =9.0 | |
BEA Weblogic Server | =8.1-sp5 | |
BEA Weblogic Server | =8.1-sp3 | |
BEA Weblogic Server | =9.1 | |
BEA Weblogic Server | =10.0 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | <=9.2 | |
BEA Weblogic Server | =8.1-sp6 | |
BEA Weblogic Server | =8.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.