• ホーム
  • コンテンツにスキップ
  • 検索にスキップ
Oracle
メニュー
  • サインイン アカウント
    Oracleアカウント

     

    サインアウト
    Oracleアカウント

    アカウントを管理して、パーソナライズされたコンテンツにアクセスできます。

    サインイン アカウントを作成
    クラウド・アカウント

    クラウド・ダッシュボードへのアクセス、ご注文の管理など、さまざまな操作を行えます。

    サインイン国を選択
    • アカウント
    • ヘルプ
  • 国を選択
  • 電話
 
Oracle Technology Network  Topics  Security
  • Embedded
  • BI & Data Warehousing
  • .NET
  • Cloud Computing
  • Big Data
  • Security
  • Enterprise Architecture
  • Digital Experience
  • Service-Oriented Architecture
  • Virtualization
  • Mobile Computing(US)
Login  |  Downloads  |  Product Documentation  |  Support
.

 

 IMPORTANT LINKS
Oracle.com
OTN
Oracle Support
BEA Support
Advisories and Notifications

Security Advisories and Notifications

Security Advisory: (BEA00-05.01)

From: BEA Systems Inc.

Minor Subject: Patch Available for Buffer Overflow in BEA WebLogic Server Proxy Plug-In

Product(s) Affected: BEA WebLogic Server and Express

Threat Level: Low

This security advisory (BEA00-05.01) contains updated information in section II. Please disregard SECURITY ADVISORY BEA00-05.00 as this advisory BEA00-05.01 supersedes it.

It has come to our attention that the BEA WebLogic Server proxy plug-in used to integrate third party Web servers may be vulnerable to a buffer overflow attack. This condition has the potential to lead to a security vulnerability in certain versions of BEA WebLogic Server and Express Web server on all supported platforms. BEA treats such possibilities with the highest degree of urgency and does everything possible to ensure the security of all customer assets. As a result, we strongly suggest the following action:

      I. Read the following advisory.

      II. Apply the suggested action.

      III. If you know of any additional users interested in future security advisories, please forward them the registration instructions below.

       IV. If you would like to report a possible security issue in a BEA product, please send it to the BEA email address listed below.


I. ADVISORY

Recently, Core SDI S.A., an information security firm in Argentina, reported a potential security vulnerability in BEA WebLogic Server and Express version 5.1.0 and 4.5.x. When the URL to a JSP is greater than 2060 characters, and the URL is passed to the BEA WebLogic Server proxy plug-in, a buffer overflow may occur. This buffer overflow may cause a security vulnerability. The potential for a buffer overflow affects the BEA WebLogic Server and Express proxy plug-ins that support Netscape Enterprise Server (NES), Microsoft Internet Information Server (IIS), and Apache Web servers.

The effect of a buffer overflow varies depending on the amount and content of the data within the URI. It is possible that a buffer overflow could cause abnormal termination of the Web server, thus resulting in Denial of Service. In addition, a skilled malicious programmer could use a buffer overflow to download, launch and execute malicious code under the Web server's user account.

This advisory covers the following releases of BEA WebLogic Server and Express:
  • Version: BEA WebLogic Server and Express version 5.1.0 and 4.5.x using Netscape Enterprise Server, Microsoft Internet Information Server (IIS), and Apache Web Server on all supported platforms.

CAUSE

The proxy plug-in used to integrate third party Web servers indicated above with BEA WebLogic Server and Express limits the URI path size to 2048 bytes. A defect in the proxy plug-in will cause a buffer overflow when the URI path size exceeds 2048 bytes.

The buffer used to hold the URI path is normally populated with both the value of the PathPrepend argument, if configured in the obj.config file of Netscape Enterprise Server or httpd.conf file of Apache, and followed by the URI path specified by the client. If the URI path specified by the client is long enough, it is possible that the computed URI path is greater than the size of the buffer, thus resulting in an overflow when the value is copied into the buffer. For Microsoft IIS, a client specified URI path exceeding 2048 bytes will cause a buffer overflow.


II. SUGGESTED ACTION

BEA strongly recommends the following course of actions:

Apply the appropriate patch below:
  • Version: BEA WebLogic Server and Express version 5.1 as part of BEA WebLogic Enterprise 5.1.x on all OS platforms
    • Action: Apply Service Pack 5 or higher
  • Version: BEA WebLogic Server and Express 5.1.x on all OS platforms
    • Action: Apply Service Pack 5 or higher
  • Version: BEA WebLogic Server and Express 4.5.2 on all OS platforms
    • Action: Apply Service Pack 1 or higher
  • Version: BEA WebLogic Server and Express 4.5.1 on all OS platforms
    • Action: Apply Service Pack 11 or higher
BEA strongly suggests that customers apply the remedies recommended in all our security advisories. In addition, customers are advised to apply every Service Pack as they are released. Service Packs include a roll up of all bug fixes for each version of the product, as well as each of the previously released Service Packs.


III. FUTURE SECURITY COMMUNICATIONS

As a policy, if there are any security-related issues with any BEA product, BEA will distribute an advisory and instructions with the appropriate course of action. Because the security of your site, data, and code is our highest priority, we are committed to communicating all security-related issues clearly and openly.

BEA has established a new, permission-based emailing list specifically targeted for product security advisories. As a policy, if a user has opted in to our emailing list and there are any security issues with the BEA product(s) he/she is using, BEA will distribute an advisory and instructions via email with the appropriate course of action.

IF THERE ARE ADDITIONAL USERS RESPONSIBLE FOR SECURITY-RELATED ISSUES AT YOUR SITE, PLEASE DIRECT THEM TO REGISTER TO RECEIVE FUTURE NOTIFICATIONS.


IV. REPORTING SECURITY ISSUES

BEA has established an email address to which you can send reports of any possible security issues in BEA products. These reports should be sent to: security-report@bea.com. All correspondence to this address will be promptly reviewed and all necessary actions taken to ensure the continued security of all customer assets.
    E-mail this page E-mail this page    Printer View Printer View
お問い合わせ
  • 電話: 0120-155-096
  • お問い合わせ先
  • オラクル・サポート・サービス
日本オラクルについて
  • 会社情報
  • コミュニティ
  • 採用情報
クラウド
  • クラウド・ソリューション概要
  • ソフトウェア(SaaS)
  • プラットフォーム(PaaS)
  • インフラストラクチャ(IaaS)
  • データ(DaaS)
  • クラウド無料トライアル
イベント
  • Oracle OpenWorld
  • Oracle Code
  • JavaOne
  • オラクルのすべてのイベント
おすすめコンテンツ
  • Javaダウンロード
  • 開発者向けJavaダウンロード
  • Oracle Cloudを試す
  • 電子メール配信登録
ニュース
  • ニュースルーム
  • オラクルのマガジン(US)
  • 顧客事例
  • 日本オラクルのブログ
主要トピック
  • ERP、EPM(財務)
  • HCM(人事/人材)
  • マーケティング
  • CX(販売/サービス/商取引)
  • サプライチェーン
  • 業種別ソリューション
  • データベース
  • MySQL
  • ミドルウェア
  • Java
  • エンジニアド・システム

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Oracle RSSフィード
Oracle

Integrated Cloud Applications & Platform Services

  • © Oracle
  • サイトマップ
  • ご利用規約およびプライバシー
  •  
  • 広告表示について