Oracle rushes out emergency Apache DoS patch
Sysadmins shouldn't hang about with this one...
Oracle broke with tradition with the publication of an unscheduled security update last weekend.
The fix – which addresses a DoS vulnerability in its Apache web server software – represents only the fifth time that Oracle has published a security fix outside the quarterly patch update batch it began at the start of 2005, net security firm Sophos notes. More specifically the patch provides an updated Apache web server, httpd, to Oracle's Fusion Middleware and Application Server products. The former product includes Apache httpd 2.2; the latter includes Apache httpd 2.0.
The vulnerability, CVE-2011-3192, creates a means to trick a web clients into requesting multiple parts of the same file at the same time, causing systems to get hopelessly tied up in knots and crash. The Apache Foundation addressed the same underlying byte-range flaw first with an 2.2.20 update at the end of August. Last week it ironed out glitches in this bug fix with a further update, 2.2.21.
It isn't clear which code base Oracle has used, although giving testing schedules and the like, the earlier (imperfect) patch seems more likely. Whatever code base it has used, Oracle is emphatic that sysadmins need to apply the patch sooner rather than later. "Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Security Alert fixes as soon as possible," it said. ®
Sponsored: 2016 Cyberthreat defense report