[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 294/04 - BEA - WebLogic Server and WebLogic Express Denial of Service attack vulnerability



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 294/04 dated 15.06.04  Time: 22:18
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
BEA Systems Inc. 
WebLogic Server and WebLogic Express
Denial of Service attack vulnerability

Detail
====== 
Security Advisory: (BEA04-61.00)

From: BEA Systems Inc.
http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_61.00.jsp

Minor Subject: A patch is available to prevent Denial of Service attack 

Product(s) Affected: WebLogic Server and WebLogic Express 

Threat level: High - Any user with HTTPS access to a Web application can exploit 
this vulnerability. 

Severity: High - WebLogic Server can crash or stop responding to requests 

Recently a problem was identified that could potentially cause a security vulnerability 
in certain versions of WebLogic Server and WebLogic Express. Patches are available to 
correct this problem (see Section II). BEA System treats potential security problems 
with the highest degree of urgency and does everything possible to ensure the security 
of all customer assets. As a result, BEA systems strongly suggests the following actions: 

I. Read the following advisory.
II. Apply the suggested action.
III. If you know of any additional users interested in future security advisories, please 
forward them the registration instructions below. 


I. Advisory
This vulnerability can occur when a user is browsing a Web application that contains 
pages protected with SSL (i.e.: the HTTPS protocol is used). Certain user actions can 
cause the server to fail to close the connection. This will eventually cause WebLogic 
Server to run out of sockets and fail to accept new requests. 

This vulnerability affects any site that has Web applications protected with SSL. 

The patch below addresses this vulnerability. 

The following versions of WebLogic Server and WebLogic Express are affected by this 
vulnerability. 


WebLogic Server and WebLogic Express 8.1, released through Service Pack 2. on all platforms 

II. SUGGESTED ACTION
BEA strongly recommends the following course of actions: 


For WebLogic Server and WebLogic Express 8.1 
Upgrade to WebLogic Server and WebLogic Express 8.1 Service Pack 2 and apply the patch:
ftp://ftpna.beasys.com/pub/releases/security/CR133071_81sp2.jar 

WebLogic Server version 8.1 Service Pack 3 will include the functionality in this patch. 


BEA strongly suggests that customers apply the remedies recommended in all our security 
advisories. BEA also urges customers to apply every Service Pack as they are released. 
Service Packs include a roll-up of all bug fixes for each version of the product, as well 
as each of the prior Service Packs. Service Packs and information about them can be 
found at: 

http://commerce.beasys.com/downloads/weblogic_server.jsp#wls 

Note: Information about securing WebLogic Server and WebLogic Express can be found 
at http://e-docs.bea.com/wls/docs81/security.html, Specific lockdown information is 
provided at http://e-docs.bea.com/wls/docs81/lockdown/index.html. We strongly encourage 
you to review this documentation to ensure your server deployment is securely configured. 


III. FUTURE SECURITY COMMUNICATIONS
As a corporate policy, if there are any security-related issues with any BEA product, 
BEA Systems will distribute an advisory and instructions with the appropriate course 
of action. Because the security of your site, data, and code is our highest priority, 
we are committed to communicating all security-related issues clearly and openly. 

All previous advisories and notifications can be viewed 
at http://dev2dev.bea.com/advisories/ 

BEA Systems has established an opt-in emailing list specifically targeted for product 
security advisories and notifications. As a policy, if a user has opted-in to our 
emailing list and there are any security issues with the BEA product(s) he/she is 
using, BEA will distribute an advisory and instructions via email with the appropriate 
course of action. 

ADDITIONAL USERS WHO WISH TO REGISTER FOR ADVISORY DISTRIBUTION SHOULD FOLLOW THE 
REGISTRATION DIRECTIONS AT http://dev2dev.bea.com/advisories 


IV. REPORTING SECURITY ISSUES
Security issues can be reported to BEA by sending email to secalert@xxxxxxx or by 
following the directions at http://dev2dev.bea.com/advisories/. All reports of 
security issues will be promptly reviewed and all necessary actions taken to ensure 
the continued security of all customer assets. 

If you have any questions or care to verify the authenticity of this advisory, please 
contact BEA Technical Support at support@xxxxxxx 

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of BEA Systems Inc. for the 
information contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>




-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQCVAwUBQM9oxIpao72zK539AQFOvwQAtC3rwu2DNTTULA6gdzrnRzPPZJLzICWp
N5P8+gCxzh+YbYXnBzl3QKjtmT9jkATGOxBhSdVpLpC58eOYUlOyWr+ff1a8u5uv
sQ5T5cJuXsGQJjSzHYnJXU6q+X+X7j9V0yftchKIZe1JuUHAwXlLHiA7q7f31Lqo
CAFhYkIr/jI=
=Uq5V
-----END PGP SIGNATURE-----