Security consultants @stake has
detected a potential vulnerability in the Oracle9i Application Server that
could lead to Denial of Service (DoS) scenarios.
In a security
alert, @stake said the potential bug was discovered in the Oracle9iAS
Web Cache admin module running on Windows. It said two different denial of
service
GET request containing at least one dot-dot-slash contained in the URI.
A second denial of service is triggered by issuing a malformed GET request,
@stake said, warning that both scenarios would create an exception and the
service will fail.
Oracle Web Cache is part of the company’s Application Server suite. It is
designed to be implemented in front of the Oracle Web server and act as a
caching reverse proxy server.
Oracle confirmed the potential security risk in a bulletin and urged users to “use firewall techniques to restrict access to the
Web Cache administration port.”
Customers were also encouraged to use the “Secure Subnets” feature of the
Web Cache Manager tool to provide access only to administrators connecting
from a list of permitted IP addresses or subnets.
“The potential security vulnerability is being tracked internally at Oracle
and will be fixed by default in the 9.0.4 release of Oracle9i Application
Server,” the company said.