Release Date: 2008-10-10
Critical:
Moderately critical
Impact: Security Bypass
DoS
System access
Where: From remote
Solution Status: Vendor Patch
OS: Fedora 9
Description:
Fedora has issued an update for condor. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system, and by malicious people to bypass certain security restrictions.
Solution:
Apply updated packages via the yum utility ("yum update condor").
Original Advisory:
FEDORA-2008-8733:
https://www.redhat.com/archives/fedor...e-announce/2008-October/msg00264.html
Other References:
SA32189:
http://secunia.com/advisories/32189/
FUJITSU Interstage Products Apache Tomcat Security Bypass
Release Date: 2008-10-10
Critical:
Not critical
Impact: Security Bypass
Where: From remote
Solution Status: Unpatched
Software: Interstage Application Server 6.x
Interstage Application Server 7.x
Interstage Application Server 8.x
Interstage Application Server 9.x
Interstage Apworks 6.x
Interstage Apworks 7.x
Interstage Business Application Server 8.x
Interstage Job Workload Server 8.x
Interstage Studio 8.x
Interstage Studio 9.x
Description:
A security issue has been reported in various FUJITSU Interstage products, which potentially can be exploited by malicious people to bypass certain security restrictions.
The security issue is caused due to a synchronisation problem when checking IP addresses and can be exploited to bypass a filter valve that extends "RemoteFilterValve" and potentially gain access to protected contexts.
Solution:
Patches are scheduled for release.
Use a proxy or firewall to protect resources.
Provided and/or discovered by:
Reported by the vendor.
Original Advisory:
FUJITSU:
http://www.fujitsu.com/global/support...ty/products-f/interstage-200806e.html
JVN:
http://jvn.jp/en/jp/JVN30732239/index.html

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic