SB2025012232 - Multiple vulnerabilities in Oracle HTTP Server



SB2025012232 - Multiple vulnerabilities in Oracle HTTP Server

Published: January 22, 2025 Updated: November 28, 2025

Security Bulletin ID SB2025012232
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 17% High 17% Medium 17% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2025-21498)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Core component in Oracle HTTP Server. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


2) Incorrect default permissions (CVE-ID: CVE-2023-49582)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to lax permissions set by the Apache Portable Runtime library on Unix platforms. A local user can read the named shared memory segments.


3) Improper certificate validation (CVE-ID: CVE-2024-8096)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to curl might fail to detect some OCSP problems when configured to use the Certificate Status Request TLS extension. A remote attacker can bypass OCSP stapling protection and perform a Man-in-the-Middle (MitM) attack.

Successful exploitation of the vulnerability requires that curl is build to use GnuTLS library.


4) Out-of-bounds read (CVE-ID: CVE-2024-5535)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the SSL_select_next_proto() function when using NPN. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds read and perform a denial of service (DoS) attack.


5) Input validation error (CVE-ID: CVE-2024-38475)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input in mod_rewrite when first segment of substitution matches filesystem path. A remote attacker can map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL and view contents of files or execute arbitrary code.


6) Integer overflow (CVE-ID: CVE-2024-45492)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the nextScaffoldPart() function in xmlparse.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.