Lucene search

K
nvd[email protected]NVD:CVE-2008-3257
HistoryJul 22, 2008 - 4:41 p.m.

CVE-2008-3257

2008-07-2216:41:00
CWE-119
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.94 High

EPSS

Percentile

99.2%

Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after “POST /.jsp” in an HTTP request.

Affected configurations

NVD
Node
beaweblogic_serverMatch3.1.8
OR
beaweblogic_serverMatch4.0
OR
beaweblogic_serverMatch4.0.4
OR
beaweblogic_serverMatch4.5
OR
beaweblogic_serverMatch4.5.1
OR
beaweblogic_serverMatch4.5.1sp15
OR
beaweblogic_serverMatch4.5.2
OR
beaweblogic_serverMatch4.5.2sp1
OR
beaweblogic_serverMatch4.5.2sp2
OR
beaweblogic_serverMatch5.1
OR
beaweblogic_serverMatch5.1sp1
OR
beaweblogic_serverMatch5.1sp10
OR
beaweblogic_serverMatch5.1sp11
OR
beaweblogic_serverMatch5.1sp12
OR
beaweblogic_serverMatch5.1sp13
OR
beaweblogic_serverMatch5.1sp2
OR
beaweblogic_serverMatch5.1sp3
OR
beaweblogic_serverMatch5.1sp4
OR
beaweblogic_serverMatch5.1sp5
OR
beaweblogic_serverMatch5.1sp6
OR
beaweblogic_serverMatch5.1sp7
OR
beaweblogic_serverMatch5.1sp8
OR
beaweblogic_serverMatch5.1sp9
OR
beaweblogic_serverMatch6.0
OR
beaweblogic_serverMatch6.0sp1
OR
beaweblogic_serverMatch6.0sp2
OR
beaweblogic_serverMatch6.0sp6
OR
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp6
OR
beaweblogic_serverMatch6.1sp7
OR
beaweblogic_serverMatch6.1sp8
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp6
OR
beaweblogic_serverMatch7.0sp7
OR
beaweblogic_serverMatch7.0.0.1
OR
beaweblogic_serverMatch7.0.0.1sp1
OR
beaweblogic_serverMatch7.0.0.1sp2
OR
beaweblogic_serverMatch7.0.0.1sp3
OR
beaweblogic_serverMatch7.0.0.1sp4
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp5
OR
beaweblogic_serverMatch8.1sp6
OR
beaweblogic_serverMatch9.0
OR
beaweblogic_serverMatch9.0ga
OR
beaweblogic_serverMatch9.0sp1
OR
beaweblogic_serverMatch9.0sp2
OR
beaweblogic_serverMatch9.0sp3
OR
beaweblogic_serverMatch9.0sp4
OR
beaweblogic_serverMatch9.0sp5
OR
beaweblogic_serverMatch9.1
OR
beaweblogic_serverMatch9.1ga
OR
beaweblogic_serverMatch9.2
OR
beaweblogic_serverMatch9.2mp1
OR
beaweblogic_serverMatch9.2mp2
OR
beaweblogic_serverMatch10.0
OR
bea_systemsapache_connector_in_weblogic_server
OR
bea_systemsweblogic_serverMatch10.0_mp1
OR
oracleweblogic_serverRange10.3

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.94 High

EPSS

Percentile

99.2%