CVE-2008-3257

Published Jul 22, 2008

Last updated 7 years ago

Overview

Description
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
10
Impact score
10
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:C/I:C/A:C

Weaknesses

nvd@nist.gov
CWE-119

Vendor comments

  • OracleOracle has released a workaround for CVE-2008-3257. Information is available at: http://www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html

Configurations