Customer threat assessment 02MAY2016(no action required)
Posted: Mon May 02, 2016 4:11 pm
This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.
Please see this forum post for an explanation of the categories used in this report.
CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.
ASL users
Summary: no action required.
Already protected against/Known Method/No update required
PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow. ASL Kernel is required to protect against this attack.
Not already protected against/New Method/Update Available
None.
Not already protected against/Doesnt protect against/Solution
None.
Potential Vulnerability/Solution
None.
Rules only users
Summary: Buffer overflow vulnerability. See below.
Already protected against/Known Method/No update required
None.
Not already protected against/New Method/Update Available
None.
Not already protected against/Doesnt protect against/Solution
Modsecurity can not protect against system level vulnerabilities such as these:
PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow
Potential Vulnerability/Solution
Upgrade to PHP is required to protect against this vulnerability.
Please see this forum post for an explanation of the categories used in this report.
CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.
ASL users
Summary: no action required.
Already protected against/Known Method/No update required
PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow. ASL Kernel is required to protect against this attack.
Not already protected against/New Method/Update Available
None.
Not already protected against/Doesnt protect against/Solution
None.
Potential Vulnerability/Solution
None.
Rules only users
Summary: Buffer overflow vulnerability. See below.
Already protected against/Known Method/No update required
None.
Not already protected against/New Method/Update Available
None.
Not already protected against/Doesnt protect against/Solution
Modsecurity can not protect against system level vulnerabilities such as these:
PHP 5.5, 5.6, 7.0 CVE-2016-3078, Zip archive handler buffer overflow
Potential Vulnerability/Solution
Upgrade to PHP is required to protect against this vulnerability.