copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AusCERT Week in Review - Week Ending 19/08/2011

Date: 19 August 2011

Click here for printable version

Good afternoon,

This week has been quiet for advisories relative to last week. This may allow some reprieve and time to catch up on the patching schedules you have.

Of note this week is the update for PHP [ASB-2011.0066] which corrects a possible remote code execution vulnerability. We are not aware of any public exploits for this yet.

Secondly, Mozilla has released updates to their products including Firefox, Thunderbird and SeaMonkey [ASB-2011.0065]. It is strongly recommended that you update all clients to the latest version as there are some serious remote code execution flaws in these products.

The last product I'll mention specifically is Apache Tomcat [ASB-2011.0064]. It is an underlying system utilised by many of your business applications. There are some vulnerabilities that should be addressed sooner rather than later in these updates.

Here is a random thought for you, what extra proactive measurements do you take to protect your infrastructure? In particular, let us consider the corporate website which may or may not contain sensitive information. Do you rely solely on vendor patches to correct security issues? I recommend putting some time into investigating the possibility of using extra mechanisms such as:

  • mod_security (Apache)
  • mod_evasive (Apache)
  • PHPIDS (IIS or Apache)
  • URLScan (IIS)
  • GreenSQL (Windows/UNIX)

Have a good weekend.

Regards,
Zane.