Check Point Reference: | CPAI-2009-009 |
Date Published: | 27 Apr 2009 |
Severity: | High |
Last Updated: | Wednesday 02 April, 2014 |
Source: | |
Industry Reference: | CVE-2008-5457 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | BEA WebLogic is a Java Application Server platform typically used as the platform for large enterprise web applications. Specifically, the vulnerability exists in the connector software for Apache HTTP server shipped with BEA WebLogic. BEA WebLogic Platform ships with a connector for Apache HTTP server. Connector software refers to the component used by web server to communicate with the application server. The Apache Web server fails to properly parse HTTP requests. Successful exploitation could result in Denial of Service condition. |
This protection will detect and block HTTP requests with invalid version specifications
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Oracle Protection Violation.
Attack Information: Oracle BEA WebLogic IIS connector JSESSIONID stack buffer overflow