store | blogs | forums | twitter | facebook | wiki | downloads | support portal
Atomic Secure Linux
It is currently Sat Aug 24, 2019 7:43 am

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]




Post new topic Reply to topic  [ 1 post ] 
Author Message
 Post subject: Customer threat assessment 02MAY2016(no action required)
Unread postPosted: Mon May 02, 2016 4:11 pm 
Offline
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin

Joined: Wed Dec 31, 1969 8:00 pm
Posts: 8329
Location: earth
This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: no action required.

Already protected against/Known Method/No update required

PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow. ASL Kernel is required to protect against this attack.

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: Buffer overflow vulnerability. See below.

Already protected against/Known Method/No update required

None.

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution


Modsecurity can not protect against system level vulnerabilities such as these:

PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow

Potential Vulnerability/Solution

Upgrade to PHP is required to protect against this vulnerability.


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group