Oracle9iAS Web Cache vulnerable to buffer overflow
Last revised: --
A complete revision history can be found at the end of this file.
- Oracle9iAS Web Cache
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or disrupt the normal operation of Web Cache.
Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the Web Cache process, or disrupt the normal operation of Web Cache. The Oracle9iAS Web Cache provides four web services that are all vulnerable and enabled by default when the software is installed. For more information about these web services, please see the Oracle9iAS Web Cache Administration and Deployment Guide (registration required). These services and the associated ports they listen on are listed below:
- 1100/tcp (incoming web cache proxy)
- 4000/tcp (administrative interface)
- 4001/tcp (web XML invalidation port)
- 4002/tcp (statistics port)
Additional information regarding this vulnerability is available at
An intruder can execute arbitrary code with the privileges of the web cache process or disrupt the normal operation of Web Cache. Additionally, an intruder might be able to intercept and/or modify sensitive data such as credentials and other types of sensitive information passing through the host running Web Cache. Finally, an intruder may be able to gain access to other systems by using Web Cache as an entry point into the network or by leveraging an existing trust relationship between Web Cache and another system.
Install a patch from Oracle. More information is available in Appendix A.
This appendix contains information provided by vendors for this advisory. When vendors report new information to the CERT/CC, we update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.
The CERT Coordination Center thanks Defcom Security, who discovered this vulnerability and published the information in their advisory. Additionally, we thank Oracle, who published an advisory on this issue.
Author: Ian A. Finlay.
Copyright 2001 Carnegie Mellon University.
October 25, 2001: initial release