I have just scanned Oracle AS 10.1.2.0.2 with up-to-date plug-ins and the
plug-in 4443 was not reported. Please save the KB for the scan and post it.



-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of rohan wijeyesinghe
Sent: Tuesday, March 27, 2007 3:39 PM
To: [email protected]
Subject: Full Listing of nessus scan on Oracle AS

The CVE's point to non-Oracle AS stuff.  Is the
"nessus" scan valid for Oracle AS 10.1.2.0.2?

CVE-2002-0133
Buffer overflows in Avirt Gateway Suite 4.2 allow
remote attackers to cause a denial of service and 
possibly execute arbitrary code via (1) long header
fields to the HTTP proxy, or (2) a long string to the
telnet proxy. 

4443
CVE-2001-0419
Buffer overflow in shared library ndwfn4.so for
iPlanet Web Server (iWS) 4.1, 
when used as a web listener for Oracle application
server 4.0.8.2, 
allows remote attackers to execute arbitrary commands
via a 
long HTTP request that is passed to the application
server, such as /jsp/. 

nv-video (4444/tcp) 
 
  
 It was possible to kill the HTTP proxy by
sending an invalid request with a too long header

A cracker may exploit this vulnerability to make your
proxy server
crash continually or even execute arbitrary code on
your system.


Solution: upgrade your software


Risk Factor : High
CVE : CVE-2002-0133, CVE-2002-0133
BID : 3904, 3905, 3904
Other references : OSVDB:6804
Plugin ID : 11715


 
 
 
 It was possible to kill the web server by
sending an invalid request with a too long HTTP 1.1
header
(Accept-Encoding, Accept-Language, Accept-Range,
Connection, 
Expect, If-Match, If-None-Match, If-Range,
If-Unmodified-Since,
Max-Forwards, TE, Host)

A cracker may exploit this vulnerability to make your
web server
crash continually or even execute arbirtray code on
your system.


Solution: upgrade your software or protect it with a
filtering reverse proxy



pharos (4443/tcp) 
 
  
 It was possible to kill the HTTP proxy by
sending an invalid request with a too long header

A cracker may exploit this vulnerability to make your
proxy server
crash continually or even execute arbitrary code on
your system.


Solution: upgrade your software


Risk Factor : High
CVE : CVE-2002-0133, CVE-2002-0133
BID : 3904, 3905, 3904
Other references : OSVDB:6804
Plugin ID : 11715


 
 
 
 It may be possible to make a web server execute
arbitrary code by sending it a too long url after
/jsp.
Ie:
GET /jsp/AAAA.....AAAAA


Risk Factor : High


Solution: Contact your vendor for the latest software
release.
CVE : CVE-2001-0419, CVE-2001-0419
BID : 2569, 2569
Plugin ID : 10654


 
 
 
 It was possible to kill the web server by
sending an invalid request with a too long HTTP 1.1
header
(Accept-Encoding, Accept-Language, Accept-Range,
Connection, 
Expect, If-Match, If-None-Match, If-Range,
If-Unmodified-Since,
Max-Forwards, TE, Host)

A cracker may exploit this vulnerability to make your
web server
crash continually or even execute arbirtray code on
your system.


Solution: upgrade your software or protect it with a
filtering reverse proxy



 
____________________________________________________________________________
________
We won't tell. Get more on shows you hate to love 
(and love to hate): Yahoo! TV's Guilty Pleasures list.
http://tv.yahoo.com/collections/265 
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to