Secunia Security Advisory - Some vulnerabilities and security issues have been reported in BEA Weblogic, which can be exploited by malicious people to gain access to sensitive information or to cause a DoS (Denial of Service).
0d2524839d30e938ac4f8c5ccad0488a7edb550ed41616d45c7a9dfc7b0a1589
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
BEA WebLogic Multiple Vulnerabilities and Security Issues
SECUNIA ADVISORY ID:
SA26539
VERIFY ADVISORY:
http://secunia.com/advisories/26539/
CRITICAL:
Moderately critical
IMPACT:
Exposure of sensitive information, DoS
WHERE:
>From remote
SOFTWARE:
BEA WebLogic Server 7.x
http://secunia.com/product/754/
BEA WebLogic Server 8.x
http://secunia.com/product/1360/
BEA WebLogic Server 9.x
http://secunia.com/product/5822/
BEA WebLogic Server 6.x
http://secunia.com/product/753/
BEA WebLogic Express 6.x
http://secunia.com/product/1281/
BEA WebLogic Express 7.x
http://secunia.com/product/1282/
BEA WebLogic Express 8.x
http://secunia.com/product/1843/
BEA WebLogic Express 9.x
http://secunia.com/product/5823/
DESCRIPTION:
Some vulnerabilities and security issues have been reported in BEA
Weblogic, which can be exploited by malicious people to gain access
to sensitive information or to cause a DoS (Denial of Service).
1) Security issues exist when a client or a server lacks the support
for any of the offered SSL ciphers. This can be exploited to leave
sensitive information transmitted in the SSL session in "clear text"
by using a null cipher suite.
The security issues are reported in the following versions:
* WebLogic Server 10.0 on all platforms
* WebLogic Server 9.2 released through Maintenance Pack 2, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms
* WebLogic Server 8.1 released through Service Pack 6, on all
platforms
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms
2) An unspecified error when processing malformed headers can be
exploited to cause a DoS by sending specially crafted headers to the
affected server.
The vulnerability is reported in the following versions:
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms
* WebLogic Server 6.1 released through Service Pack 7, on all
platforms
3) An unspecified error exists in the processing of client requests.
This can be exploited to hang server threads by performing
unspecified malicious actions.
The vulnerability is reported in the following versions:
* WebLogic Server 8.1 released through Service Pack 4, on all
platforms.
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms.
* WebLogic Server 6.1 released through Service Pack 7, on all
platforms.
SOLUTION:
Apply patches (see vendor advisories for details).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
1) http://dev2dev.bea.com/pub/advisory/245
http://dev2dev.bea.com/pub/advisory/244
2) http://dev2dev.bea.com/pub/advisory/247
3) http://dev2dev.bea.com/pub/advisory/246
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------