Sunday, September 18, 2011

Oracle closes DoS holes out of sequence

Oracle closes DoS holes out of sequence

An error in the implementation of byte-range requests through the Apache
Web server also affects Oracle products that integrate this open source
software. Therefore, the company now offers corrections to outside of
his usual three-month patch cycle.

It relates to the Fusion Middleware 11g Release 1 (11.1.1.3 and 11.1.1.5
versions) and the Enterprise Manager, because it contains the fusion
component. In addition, the Application Server Release 2 and 3 is
vulnerable, so if the distributed version of httpd was installed 2.0.
Oracle recommends that customers update their software as quickly as
possible. Details illustrating a page in the Support Portal.

The bug allows attackers to cripple by a web server denial of service
attack. Needed to resolve it not only fixes the servers are even
necessary: ​​the IETF is considering Moreover, a change in HTTP.

No comments:

Post a Comment