First published: Fri Aug 31 2007(Updated: )
The SSL server implementation in BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP1, and 10.0 sometimes selects the null cipher when no other cipher is compatible between the server and client, which might allow remote attackers to intercept communications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =7.0-sp7 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =9.0 | |
BEA Weblogic Server | =9.2 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =7.0-sp6 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =8.1-sp5 | |
BEA Weblogic Server | =8.1-sp3 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =7.0-sp5 | |
BEA Weblogic Server | =9.1 | |
BEA Weblogic Server | =10.0 | |
BEA Weblogic Server | =9.2-mp1 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =8.1-sp6 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =8.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.