Vulnerability Description
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier and 7.0 SP6 and earlier, when using the weblogic.Deployer command with the t3 protocol, does not use the secure t3s protocol even when an Administration port is enabled on the Administration server, which might allow remote attackers to sniff the connection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bea | Weblogic Server | 7.0 |
References
- http://dev2dev.bea.com/pub/advisory/156PatchVendor Advisory
- http://secunia.com/advisories/17138PatchVendor Advisory
- http://www.securityfocus.com/bid/15052Patch
- http://dev2dev.bea.com/pub/advisory/156PatchVendor Advisory
- http://secunia.com/advisories/17138PatchVendor Advisory
- http://www.securityfocus.com/bid/15052Patch
FAQ
What is CVE-2005-4765?
CVE-2005-4765 is a vulnerability with a CVSS score of 7.6 (HIGH). BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier and 7.0 SP6 and earlier, when using the weblogic.Deployer command with the t3 protocol, does not use the secure t3s protocol even when an A...
How severe is CVE-2005-4765?
CVE-2005-4765 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4765?
Check the references section above for vendor advisories and patch information. Affected products include: Bea Weblogic Server.