InfoSec News

Here's a cut and paste from the description:

This security alert addresses the security issue CVE-2011-3192, a denial of service vulnerability in Apache HTTPD, which is applicable to Oracle HTTP Server products based on Apache 2.0 or 2.2. This vulnerability may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password. A remote user can exploit this vulnerability to impact the availability of un-patched systems.

Affected Products and Versions

- Oracle Fusion Middleware 11g Release 1, versions 11.1.1.3.0, 11.1.1.4.0, 11.1.1.5.0

- Oracle Application Server 10g Release 3, version 10.1.3.5.0 (Only affected when Oracle HTTP Server 10g based on Apache 2.0 has been installed from Application Server Companion CD)

- Oracle Application Server 10g Release 2, version 10.1.2.3.0 (Only affected when Oracle HTTP Server 10g based on Apache 2.0 has been installed from Application Server Companion CD)



Please note that Oracle Enterprise Manager includes the Oracle Fusion Middleware component that is affected by this vulnerability. Oracle Enterprise Manager is affected only if the affected Oracle Fusion Middleware version (noted above) is being used. Since a vulnerability affecting Oracle Fusion Middleware versions may affect Oracle Enterprise Manager, Oracle recommends that customers apply the fix for this vulnerability to the Oracle Fusion Middleware component of Oracle Enterprise Manager. For information on what patches need to be applied to your environments, refer to Security Alert CVE-2011-3192 Patch Availability Document, My Oracle Support Note 1357871.1.



For those of you running the above software, please be sure and patch quickly! Thanks Dave for bringing this to our attention. Dave reminds us all ...the bug is serious enough for Oracle to issue the patch outside of its usual large quarterly updates, the next of which is scheduled for Oct. 18.
-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
From the Newsdesk of Stories that won't die, there's some new information regarding the now infamous DigiNotarCertificates. Apparently Microsoft's latest update didn't kill all of the certificates, and I quote fromhttp://support.microsoft.com/kb/2616676/us:


We are investigating an issue with update 2616676 for all Windows XP-based and Windows Server 2003-based systems.

The versions of update 2616676 for Windows XP and for Windows Server 2003 contain only the latest six digital certificates that are cross-signed by GTE and Entrust. These versions of the update do not contain the digital certificates that were included in update 2607712.


-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

GMANews.TV

VP Binay's website defaced anew
GMANews.TV
HaCkeD By PrivateX InfoSec::. ... This site has been hacked by PrivateX InfoSec," said the message at the redirected page. It claimed to support the AntiSec movement of hacktivist group Anonymous and Lulz Security, adding no data was taken off the ...

 
Microsoft's next operating system is not designed for your parents -- or is it? Take a look and see what could be on your next PC, or tablet.
 
'Virtual assistants,' with some of the qualities of HAL 9000 in 2001: A Space Odyssey, are emerging in startup technologies everywhere, writes columnist Mike Elgan.
 
Internet Storm Center Infocon Status