Original release date: October 25, 2001
Last revised: --
A complete revision history can be found at the end of this file.
A remotely exploitable buffer overflow in the Oracle9iAS Web Cache allows intruders to execute arbitrary code or disrupt the normal operation of Web Cache.
Defcom Labs has discovered a remotely exploitable buffer overflow vulnerability in the Oracle9iAS Web Cache (on all platforms) that allows intruders to either execute arbitrary code with the privileges of the Web Cache process, or disrupt the normal
operation of Web Cache. The Oracle9iAS Web Cache provides four web services that are all vulnerable and enabled by default when the software is installed. For more information about these web services, please see the Oracle9iAS Web Cache Administration and Deployment Guide (registration required). These services and the associated ports they listen on are
- 1100/tcp (incoming web cache proxy)
- 4000/tcp (administrative interface)
- 4001/tcp (web XML invalidation port)
- 4002/tcp (statistics port)
Additional information regarding this vulnerability is available at
An intruder can execute arbitrary code with the privileges of the web cache process or disrupt the normal operation of Web Cache. Additionally, an intruder might be able to intercept and/or modify sensitive data such as credentials and other types of
sensitive information passing through the host running Web Cache. Finally, an intruder may be able to gain access to other systems by using Web Cache as an entry point into the network or by leveraging an existing trust relationship between Web Cache and
Install a patch from Oracle. More information is available in Appendix A.
This appendix contains information provided by vendors for this advisory. When vendors report new information to the CERT/CC, we update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not
received their comments.
Please see http://otn.oracle.com/deploy/security/pdf/webcache.pdf
The CERT Coordination Center thanks Defcom Security, who discovered this vulnerability and published the information in their advisory. Additionally, we thank Oracle, who published an advisory on this issue.
Author: Ian A. Finlay.
Copyright 2001 Carnegie Mellon University.
October 25, 2001: initial release