ID
VAR-201102-0002
CVE
CVE-2009-0189
TITLE
Oracle April 2009 Critical Patch Update Multiple Vulnerabilities
Trust: 0.3
DESCRIPTION
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-1012. Reason: This candidate is a reservation duplicate of CVE-2009-1012. Notes: All CVE users should reference CVE-2009-1012 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Oracle has released the April 2009 critical patch update that addresses 43 vulnerabilities affecting the following software: Oracle Database Oracle Audit Vault Oracle Application Server Oracle Outside In SDK HTML Export Oracle XML Publisher Oracle BI Publisher Oracle E-Business Suite PeopleSoft Enterprise PeopleTools PeopleSoft Enterprise HRMS Oracle WebLogic Server (formerly BEA WebLogic Server) Oracle Data Service Integrator Oracle AquaLogic Data Services Platform Oracle JRockit. ====================================================================== Secunia Research 15/04/2009 - Oracle BEA WebLogic Server Plug-ins Integer Overflow - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10 ====================================================================== 1) Affected Software * Oracle BEA WebLogic Server Plug-ins version 1.0.1166189. NOTE: Other versions may also be affected. ====================================================================== 2) Severity Rating: Highly critical Impact: System access Where: From Remote ====================================================================== 3) Vendor's Description of Software "... the world's best application server for building and deploying enterprise applications and services ...". Product Link: http://www.oracle.com/technology/products/weblogic/index.html ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a vulnerability in the Oracle BEA WebLogic Server plug-ins for web servers, which can be exploited by malicious people to compromise a vulnerable system. The Oracle BEA WebLogic Server can be configured to receive requests via an Apache, Sun, or IIS web server. In this case, a plug-in is installed in the Internet-facing web server that passes the request to a WebLogic server. An integer overflow when parsing HTTP requests can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. ====================================================================== 5) Solution Apply patches released by the vendor. ====================================================================== 6) Time Table 01/03/2009 - Vendor notified. 06/03/2009 - Vendor response requesting more information. 06/03/2009 - Sent PoC to vendor. 10/03/2009 - Vendor confirms vulnerability. 12/03/2009 - Vendor requests more information. 15/03/2009 - Supplemental information sent to vendor. 17/03/2009 - Vendor confirms and provides preliminary patch. 15/04/2009 - Public disclosure. ====================================================================== 7) Credits Discovered by Dyon Balding, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2009-0189 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2009-22/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================
Trust: 1.26
AFFECTED PRODUCTS
vendor: | oracle | model: | jrockit r27.1.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 5.6.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.01 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp1 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i personal edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.49 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g standard edition one | scope: | eq | version: | 11.16 | Trust: 0.3 |
vendor: | oracle | model: | data service integrator | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.3 | Trust: 0.3 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 10.1.3.2.1 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g application server | scope: | eq | version: | 10.1.2.3.0 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition | scope: | eq | version: | 9.2.8.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.06 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp6 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | xml publisher | scope: | eq | version: | 10.1.3.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.16 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.11 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.13 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.04 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g enterprise edition | scope: | eq | version: | 11.1.0.7 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 7.0.0.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | oracle | model: | jrockit r27.6.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.07 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp2 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp5 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g application server | scope: | eq | version: | 10.1.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp3 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.1 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server maintenance pack | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.13 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i standard edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g enterprise edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i enterprise edition .8dv | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g standard edition | scope: | eq | version: | 10.1.5 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise hrms | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.3.2 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite 11i | scope: | eq | version: | 11.5.10.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.12 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.15 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.05 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.16 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server mp1 | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise hrms | scope: | eq | version: | 8.9 | Trust: 0.3 |
vendor: | oracle | model: | audit vault | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | oracle | model: | jrockit r27.6.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.02 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic portal sp4 | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | oracle | model: | bi publisher | scope: | eq | version: | 10.1.3.4 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.14 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 8.12 | Trust: 0.3 |
vendor: | oracle | model: | weblogic server | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.11 | Trust: 0.3 |
vendor: | oracle | model: | e-business suite | scope: | eq | version: | 12.0.6 | Trust: 0.3 |
vendor: | oracle | model: | outside in sdk html export | scope: | eq | version: | 8.3 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g personal edition | scope: | eq | version: | 10.2.0.4 | Trust: 0.3 |
vendor: | oracle | model: | oracle9i personal edition | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | oracle | model: | oracle11g standard edition | scope: | eq | version: | 11.16 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.0.0.14 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp | scope: | eq | version: | 7.03 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server sp7 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | oracle | model: | outside in sdk html export | scope: | eq | version: | 8.2.2 | Trust: 0.3 |
vendor: | oracle | model: | aqualogic data services platform | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | bea | model: | systems weblogic server | scope: | eq | version: | 9.0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Unknown
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2009-0189 | Trust: 1.4 |
db: | ZDI | id: | ZDI-09-017 | Trust: 0.3 |
db: | BID | id: | 34461 | Trust: 0.3 |
db: | PACKETSTORM | id: | 76691 | Trust: 0.1 |
REFERENCES
url: | http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html | Trust: 0.6 |
url: | http://secunia.com/secunia_research/2009-22/ | Trust: 0.4 |
url: | http://secunia.com/secunia_research/2009-23/ | Trust: 0.3 |
url: | http://www.appsecinc.com/resources/alerts/oracle/2009-03.shtml | Trust: 0.3 |
url: | http://www.oracle.com | Trust: 0.3 |
url: | /archive/1/502845 | Trust: 0.3 |
url: | /archive/1/502707 | Trust: 0.3 |
url: | /archive/1/502697 | Trust: 0.3 |
url: | /archive/1/502727 | Trust: 0.3 |
url: | /archive/1/502723 | Trust: 0.3 |
url: | /archive/1/506160 | Trust: 0.3 |
url: | /archive/1/502724 | Trust: 0.3 |
url: | /archive/1/502683 | Trust: 0.3 |
url: | http://www.zerodayinitiative.com/advisories/zdi-09-017/ | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1001.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1002.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1003.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1004.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1005.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1006.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1012.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/deploy/security/wls-security/1016.html | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqadm_sys.html | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aqin.html | Trust: 0.3 |
url: | http://www.red-database-security.com/advisory/apex_password_hashes.html | Trust: 0.3 |
url: | http://www.oracle.com/technology/products/weblogic/index.html | Trust: 0.1 |
url: | http://secunia.com/secunia_research/ | Trust: 0.1 |
url: | http://secunia.com/corporate/jobs/ | Trust: 0.1 |
url: | http://secunia.com/advisories/mailing_lists/ | Trust: 0.1 |
url: | http://secunia.com/advisories/ | Trust: 0.1 |
url: | http://secunia.com/advisories/business_solutions/ | Trust: 0.1 |
url: | https://nvd.nist.gov/vuln/detail/cve-2009-0189 | Trust: 0.1 |
CREDITS
Dyon Balding of Secunia Research, Joshua J. Drake of iDefense, Gerhard Eschelbeck of Qualys, Inc., Esteban Martinez Fayo of Application Security, Inc., Franz Huell of Red Database Security, Mike Janowski of Neohapsis, Inc., Joxean Koret, Joxean Koret of Ti
Trust: 0.3
SOURCES
db: | BID | id: | 34461 |
db: | PACKETSTORM | id: | 76691 |
db: | NVD | id: | CVE-2009-0189 |
LAST UPDATE DATE
2024-08-14T13:01:34.773000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 34461 | date: | 2009-09-01T16:22:00 |
db: | NVD | id: | CVE-2009-0189 | date: | 2023-11-07T02:03:34.930 |
SOURCES RELEASE DATE
db: | BID | id: | 34461 | date: | 2009-04-09T00:00:00 |
db: | PACKETSTORM | id: | 76691 | date: | 2009-04-15T21:07:43 |
db: | NVD | id: | CVE-2009-0189 | date: | 2011-02-01T19:00:03.890 |