RULE(RULE ID:711176)

Rule General Information
Release Date: 2017-06-07
Rule Name: WEB-OTHER BEA Weblogic Server Apache Connector HTTP Version String Buffer Overflow Vulnerability -1 (CVE-2008-3257)
Severity:
CVE ID:
Rule Protection Details
Description: Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service.
Affected OS: ALL
Reference: http://www.securityfocus.com/bid/30273
http://www.securitytracker.com/id?1020520
Solutions
No information about possible solutions is published. Please use an alternative product to substitude the affected software.