Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/11330.php | Vendor Advisory |
http://www.kb.cert.org/vuls/id/849993 | Exploit Patch Third Party Advisory US Government Resource |
http://otn.oracle.com/deploy/security/pdf/2003alert52.pdf | Patch Vendor Advisory |
http://www.nextgenss.com/advisories/ora-appservfmtst.txt | |
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0076.html | |
http://www.cert.org/advisories/CA-2003-05.html | US Government Resource |
http://www.ciac.org/ciac/bulletins/n-046.shtml | |
http://www.securityfocus.com/bid/6846 | |
http://marc.info/?l=bugtraq&m=104549708626309&w=2 | |
http://marc.info/?l=bugtraq&m=104560577227981&w=2 | |
http://marc.info/?l=bugtraq&m=104559446010858&w=2 |
Configurations
Information
Published : 2003-03-02 21:00
Updated : 2016-10-17 19:22
NVD link : CVE-2002-0842
Mitre link : CVE-2002-0842
JSON object : View
CWE
Products Affected
oracle
- application_server