The cluster cookie parsing code in BEA WebLogic Server 7.0 through Service Pack 5 attempts to contact any host or port specified in a cookie, even when it is not in the cluster, which allows remote attackers to cause a denial of service (cluster slowdown) via modified cookies.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/129 - Vendor Advisory | |
References | () http://secunia.com/advisories/15486 - Vendor Advisory | |
References | () http://securitytracker.com/id?1014049 - | |
References | () http://www.securityfocus.com/bid/13717 - | |
References | () http://www.vupen.com/english/advisories/2005/0606 - |
Information
Published : 2005-05-24 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-1746
Mitre link : CVE-2005-1746
CVE.ORG link : CVE-2005-1746
JSON object : View
Products Affected
oracle
- weblogic_portal
bea
- weblogic_server
CWE