BEA WebLogic Server and WebLogic Express 8.1 through 8.1 SP2 allow remote attackers to cause a denial of service (network port consumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the session ends.
References
| Link | Resource |
|---|---|
| http://dev2dev.bea.com/pub/advisory/7 | Patch Vendor Advisory |
| http://secunia.com/advisories/11864 | Patch Vendor Advisory |
| http://securitytracker.com/id?1010492 | Patch Vendor Advisory |
| http://www.osvdb.org/7076 | Patch |
| http://www.securityfocus.com/bid/10544 | Patch |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/16419 | |
| http://dev2dev.bea.com/pub/advisory/7 | Patch Vendor Advisory |
| http://secunia.com/advisories/11864 | Patch Vendor Advisory |
| http://securitytracker.com/id?1010492 | Patch Vendor Advisory |
| http://www.osvdb.org/7076 | Patch |
| http://www.securityfocus.com/bid/10544 | Patch |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/16419 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2424
Mitre link : CVE-2004-2424
CVE.ORG link : CVE-2004-2424
JSON object : View
Products Affected
bea
- weblogic_server
CWE
