Security Advisory: (BEA03-39.00)
From: Oracle Corporation
Minor Subject: Remedies available to prevent Denial of Service
Product(s) Affected: WebLogic Server proxy plug-ins for WebLogic Server and Express
Threat level: High
Any user with knowledge can exploit this vulnerability
Severity: High
When exploited this vulnerability will cause your website to become inaccessible even though WebLogic Server will continue to report good health.
Recently a developer at Jamba! identified a problem that could potentially cause a security vulnerability in certain versions of WebLogic Server and Express. Remedies are available to correct this problem (see section II below). BEA treats such possibilities with the highest degree of urgency and does everything possible to ensure the security of all customer assets. As a result, we strongly suggest the following action:
This vulnerability can occur when incorrectly formatted URLs are sent to WebLogic Server or Express through a WebLogic Server proxy plug-in. The incorrect URL will cause the proxy plug-in to crash. This has the effect of making the website inaccessible. Sites that do not use the WebLogic Server proxy plug-ins are not affected by this vulnerability. All sites that do use the WebLogic Server proxy plug-ins are vulnerable to this.
The following versions of WebLogic Server and Express are affected by this vulnerability
Oracle strongly recommends the following course of actions:
For WebLogic Server and Express 6.1, 7.0, and 8.1, using the WebLogic proxy plugin on supported Unix/Linux platforms, that is
Apache HTTP Server running on Solaris, HPUX, Linux, AIX, or Tru64 :
Or
for iPlanet running on Solaris, HPUX, or AIX:
For customers using a plug-in with export strength SSL:
Download and apply the patch #7823372 from OracleMetaLink as per the instructions below:
For customers using a plug-in with domestic strength SSL:
Contact Oracle Customer Support.
Follow the instructions in the enclosed readme to extract and apply the updated components.
The remedy will be available in the versions of the plug-ins distributed with
For WebLogic Server and Express 6.1, 7.0, and 8.1, using the WebLogic proxy plugin on supported Microsoft NT platforms, that is
Apache HTTP Server on Microsoft NT or Microsoft Windows 2000:
or
Microsoft Internet Information Services on Microsoft NT or Microsoft Windows 2000:
For customers using a plug-in with export strength SSL:
Download and apply the patch #7823384 from OracleMetaLink as per the instructions below:
For customers using a plug-in with domestic strength SSL:
Contact Oracle Customer Support.
Follow the instructions in the enclosed readme to extract and apply the updated components.
The remedy will be available in the versions of the plug-ins distributed with
Oracle strongly suggests that customers apply the remedies recommended in all our security advisories. Oracle also urges customers to apply every Service/Maintenance Pack as they are released. Service/Maintenance Packs include a roll-up of all bug fixes for each version of the product, as well as each of the prior Service/Maintenance Packs. Service/Maintenance Packs.
As a policy, if there are any security-related issues with any Oracle product, Oracle will distribute an advisory and instructions with the appropriate course of action. Because the security of your site, data, and code is our highest priority, we are committed to communicating all security-related issues clearly and openly.
Additional users who wish to register for product advisory distribution should follow the registration directions at: http://www.oracle.com/security-alerts/.
Security issues can be reported to Oracle by following the directions at: http://www.oracle.com/security-alerts/.
Thank you,
Oracle Corporation