Monthly Archives: July 2015
British teenager sentenced for massive Spamhaus attack
British teen Seth Nolan Mcdonagh, aka “narko” has been sentenced for his role in a 2013 attack which slowed the internet around the world.
The post British teenager sentenced for massive Spamhaus attack appeared first on We Live Security.
![]()
Kaspersky Internet Security Earns Highest Award in AV-Comparatives Performance Test
APPLE-SA-2015-07-15-1 OS X: Web plug-ins blocked
From: Apple Product Security
Reply to list
APPLE-SA-2015-07-15-1 OS X: Web plug-ins blocked Due to security issues in older versions, Apple has updated the web plug-in blocking mechanism to disable all versions of the Adobe Flash Player prior to 18.0.0.209 and 13.0.0.305. In addition, due to security issues in older versions, [...]
Bugtraq: Backdoor credentials found in 4 TOTOLINK router models
Backdoor credentials found in 4 TOTOLINK router models
Bugtraq: Backdoor and RCE found in 8 TOTOLINK router models
Backdoor and RCE found in 8 TOTOLINK router models
Bugtraq: [CVE-2015-3253] Apache Groovy Zero-Day Vulnerability Disclosure
[CVE-2015-3253] Apache Groovy Zero-Day Vulnerability Disclosure
Bugtraq: Re: [FD] 15 TOTOLINK router models vulnerable to multiple RCEs
Re: [FD] 15 TOTOLINK router models vulnerable to multiple RCEs
United Airlines pays out 2 million flight miles for security bugs
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
The post United Airlines pays out 2 million flight miles for security bugs appeared first on We Live Security.
![]()
[ANNOUNCEMENT] Apache HTTP Server 2.4.16 Released
Apache HTTP Server 2.4.16 Released
The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.16 of the Apache
HTTP Server ("Apache"). This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This release of Apache is
principally a security, feature and bug fix release. NOTE: versions
2.4.13, 2.4.14 and 2.4.15 were not released.
CVE-2015-3183 (cve.mitre.org)
core: Fix chunk header parsing defect.
Remove apr_brigade_flatten(), buffering and duplicated code from
the HTTP_IN filter, parse chunks in a single pass with zero copy.
Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
authorized characters.
CVE-2015-3185 (cve.mitre.org)
Replacement of ap_some_auth_required (unusable in Apache httpd 2.4)
with new ap_some_authn_required and ap_force_authn hook.
CVE-2015-0253 (cve.mitre.org)
core: Fix a crash with ErrorDocument 400 pointing to a local URL-path
with the INCLUDES filter active, introduced in 2.4.11. PR 57531.
CVE-2015-0228 (cve.mitre.org)
mod_lua: A maliciously crafted websockets PING after a script
calls r:wsupgrade() can cause a child process crash.
Also in this release are some exciting new features including:
*) Better default recommended SSLCipherSuite and SSLProxyCipherSuite
*) mod_proxy_scgi: ProxySCGIInternalRedirect now allows an alternate
response header to be used by the application
*) Event MPM improvements
*) Various mod_proxy_* improvements
*) mod_log_config: Add "%{UNIT}T" format to output request duration in
seconds, milliseconds or microseconds depending on UNIT ("s", "ms",
"us")
We consider this release to be the best version of Apache available, and
encourage users of all prior versions to upgrade.
Apache HTTP Server 2.4.16 is available for download from:
http://httpd.apache.org/download.cgi
Apache 2.4 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase. For an overview of new features
introduced since 2.4 please see:
http://httpd.apache.org/docs/trunk/new_features_2_4.html
Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.4.16 includes only
those changes introduced since the prior 2.4 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
is available:
http://httpd.apache.org/security/vulnerabilities_24.html
This release requires the Apache Portable Runtime (APR) version 1.5.x
and APR-Util version 1.5.x. The APR libraries must be upgraded for all
features of httpd to operate correctly.
This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and require minimal or no source code changes.
http://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING
When upgrading or installing this version of Apache, please bear in mind
that if you intend to use Apache with one of the threaded MPMs (other
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.