VYPR
Unrated severityNVD Advisory· Published Jul 22, 2008· Updated Apr 23, 2026

CVE-2008-3257

CVE-2008-3257

Description

Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.

Affected products

72
  • cpe:2.3:a:bea_systems:apache_connector_in_weblogic_server:*:*:*:*:*:*:*:*
  • Bea/Weblogic Server70 versions
    cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*+ 69 more
    • cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5.1:sp15:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5.2:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:4.5.2:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.0:sp6:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:6.1:sp8:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*
    • cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*
  • cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
    Range: <=10.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.