---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: BEA WebLogic Multiple Vulnerabilities and Security Issues SECUNIA ADVISORY ID: SA26539 VERIFY ADVISORY: http://secunia.com/advisories/26539/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS WHERE: >From remote SOFTWARE: BEA WebLogic Server 7.x http://secunia.com/product/754/ BEA WebLogic Server 8.x http://secunia.com/product/1360/ BEA WebLogic Server 9.x http://secunia.com/product/5822/ BEA WebLogic Server 6.x http://secunia.com/product/753/ BEA WebLogic Express 6.x http://secunia.com/product/1281/ BEA WebLogic Express 7.x http://secunia.com/product/1282/ BEA WebLogic Express 8.x http://secunia.com/product/1843/ BEA WebLogic Express 9.x http://secunia.com/product/5823/ DESCRIPTION: Some vulnerabilities and security issues have been reported in BEA Weblogic, which can be exploited by malicious people to gain access to sensitive information or to cause a DoS (Denial of Service). 1) Security issues exist when a client or a server lacks the support for any of the offered SSL ciphers. This can be exploited to leave sensitive information transmitted in the SSL session in "clear text" by using a null cipher suite. The security issues are reported in the following versions: * WebLogic Server 10.0 on all platforms * WebLogic Server 9.2 released through Maintenance Pack 2, on all platforms * WebLogic Server 9.1 on all platforms * WebLogic Server 9.0 on all platforms * WebLogic Server 8.1 released through Service Pack 6, on all platforms * WebLogic Server 7.0 released through Service Pack 7, on all platforms 2) An unspecified error when processing malformed headers can be exploited to cause a DoS by sending specially crafted headers to the affected server. The vulnerability is reported in the following versions: * WebLogic Server 7.0 released through Service Pack 7, on all platforms * WebLogic Server 6.1 released through Service Pack 7, on all platforms 3) An unspecified error exists in the processing of client requests. This can be exploited to hang server threads by performing unspecified malicious actions. The vulnerability is reported in the following versions: * WebLogic Server 8.1 released through Service Pack 4, on all platforms. * WebLogic Server 7.0 released through Service Pack 7, on all platforms. * WebLogic Server 6.1 released through Service Pack 7, on all platforms. SOLUTION: Apply patches (see vendor advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: 1) http://dev2dev.bea.com/pub/advisory/245 http://dev2dev.bea.com/pub/advisory/244 2) http://dev2dev.bea.com/pub/advisory/247 3) http://dev2dev.bea.com/pub/advisory/246 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------