---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: IBM WebSphere Application Server for z/OS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA37545 VERIFY ADVISORY: http://secunia.com/advisories/37545/ DESCRIPTION: A weakness and some vulnerabilities have been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), or compromise a vulnerable system. 1) A weakness in the IBM HTTP Server can be exploited by malicious people to cause a DoS. For more information: SA35781 2) Some vulnerabilities are caused due to the IBM HTTP Server including a vulnerable Apache Portable Runtime version. For more information: SA37050 3) A vulnerability is caused due to a NULL pointer dereference error within mod_proxy_ftp when processing responses received from FTP servers. For more information: SA37116 4) A vulnerability is caused due to an error in the TLS protocol while handling session re-negotiations. For more information: SA37291 SOLUTION: Apply APAR PK96157. http://www-01.ibm.com/support/docview.wss?uid=swg1PK96157 APAR PK96157 is currently targeted for inclusion in Service Level (Fix Pack) 6.0.2.39. ORIGINAL ADVISORY: IBM (PK91361, PK93225, PK96858, PM00765): http://www-01.ibm.com/support/docview.wss?uid=swg1PK96157 OTHER REFERENCES: SA35781: http://secunia.com/advisories/35781/ SA37050: http://secunia.com/advisories/37050/ SA37116: http://secunia.com/advisories/37116/ SA37291: http://secunia.com/advisories/37291/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------