With bug public, Oracle rushes out WebLogic fix
IDG News Service - Oracle has rushed out a patch for its WebLogic application server, two weeks after a Russian security researcher posted details of the vulnerability.
The flaw lies in WebLogic's Node Manager software, which is typically blocked at the firewall. However, if hacker is able to access Node Manager's administrative port, the results could be devastating, Oracle said. "A successful exploitation of this vulnerability may result in a full compromise of the targeted server on Windows. On other platforms (Unix, Linux, etc.), the attacker may gain access to the targeted server with the same privileges as the WebLogic server processes," Oracle wrote in a blog post detailing the issue.
Oracle issued its most-recent set of security patches on Jan. 12, but was apparently forced to rush out a WebLogic patch after security research firm Intevydis went public with details of the flaw on Jan. 23. The Russian company posted information on dozens of vulnerabilities during the month of January, in an effort to draw attention to he large number of server and database vulnerabilities that are not being patched.
An Oracle spokeswoman declined to comment on the patch. In its security alert, Oracle said it, "strongly recommends that the fix for this vulnerability be applied as soon as possible." The flaw affects versions 7 and higher of WebLogic.
Intevydis CEO Evgeny Legerov said his company is not following standard industry practice of notifying vendors of the bugs ahead of time because this "allows vendors to exploit security [researchers] to do QA work for free," according to a blog posting.
In an e-mail Friday, Legerov confirmed that Oracle wasn't notified of this particular flaw ahead of time. "Since we have rather limited resources and we are not working for Oracle we are staying away from responsible disclosure path," he said.
"It is pretty serious bug," he explained, "a remote attacker could execute OS commands without any authentication."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts