BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier and 7.0 SP6 and earlier, when using the weblogic.Deployer command with the t3 protocol, does not use the secure t3s protocol even when an Administration port is enabled on the Administration server, which might allow remote attackers to sniff the connection.
References
Link | Resource |
---|---|
http://dev2dev.bea.com/pub/advisory/156 | Patch Vendor Advisory |
http://secunia.com/advisories/17138 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/15052 | Patch |
http://dev2dev.bea.com/pub/advisory/156 | Patch Vendor Advisory |
http://secunia.com/advisories/17138 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/15052 | Patch |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/156 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/17138 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/15052 - Patch |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:05
NVD link : CVE-2005-4765
Mitre link : CVE-2005-4765
CVE.ORG link : CVE-2005-4765
JSON object : View
Products Affected
bea
- weblogic_server
CWE