Vulnerability Name: | CVE-2001-1216 (CCN-7727) | ||||||||
Assigned: | 2001-12-21 | ||||||||
Published: | 2001-12-21 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Buffer overflow in PL/SQL Apache module in Oracle 9i Application Server allows remote attackers to execute arbitrary code via a long request for a help page. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-1216 Source: CCN Type: Oracle MetaLink Web site Oracle Corporation - OracleMetaLink Source: CCN Type: Oracle Security Alert #25 Vulnerabilities in MODPLSQL Source: CONFIRM Type: UNKNOWN http://otn.oracle.com/deploy/security/pdf/modplsql.pdf Source: CCN Type: CERT Advisory CA-2002-08 Multiple vulnerabilities in Oracle Servers Source: XF Type: Patch, Vendor Advisory oracle-appserver-modplsql-bo(7727) Source: CCN Type: US-CERT VU#500203 Oracle9i Application Server Apache PL/SQL module vulnerable to buffer overflow via help page request Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#500203 Source: CCN Type: NGSSoftware Insight Security Research Advisory #NISR20122001 Oracle PL/SQL Apache Module Source: CCN Type: OSVDB ID: 9459 Oracle PL/SQL (mod_plsql) Apache Module Help Page Request Remote Overflow Source: BUGTRAQ Type: Vendor Advisory 20011221 Buffer Overflow in Oracle 9iAS (#NISR20122001) Source: BID Type: Patch, Vendor Advisory 3726 Source: CCN Type: BID-3726 Oracle 9I Application Server PL/SQL Apache Module Buffer Overflow Vulnerability Source: XF Type: UNKNOWN oracle-appserver-modplsql-bo(7727) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |