Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Red Hat: 2012:1225-01: java-1.7.0-oracle: Critical Advisory

Sep05
by Ike on September 5, 2012 at 3:47 am
Posted In: Uncategorized

(Sep 4) Updated java-1.7.0-oracle packages that fix several security issues are now available for Red Hat Enterprise Linux 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]

└ Tags: Red Hat, security, update
 Comment 

Plesk Automation Preview #5 is now Available!

Sep05
by Ike on September 5, 2012 at 1:29 am
Posted In: Plesk, Releases

Key features, the release introduces, are CentOS/RHEL 6 on service node, Plesk 10.x/11.x transfer to PPA, migration from Plesk Expand, upgrade from PPA Preview #4 as well as a few functional enhancements.

└ Tags: Plesk Expand, PPA
 Comment 

Governments and banks still using weak MD5-signed SSL certificates

Aug31
by Ike on August 31, 2012 at 1:05 pm
Posted In: Around the Net, security

More than a thousand websites – including several government sites – are still using SSL certificates with weak signature algorithms.

Netcraft’s August 2012 SSL Survey shows there are 1,300 websites still using SSL certificates that have been signed using the cryptographically weak MD5 digest algorithm. This algorithm is demonstrably vulnerable to several types of attack, including collision attacks.

The first use of this vulnerability against SSL was demonstrated back in December 2008, when security researchers showed how an MD5 hash collision could be exploited to create a rogue certificate authority (CA) certificate that would be trusted by all common web browsers. This rogue certificate could have been used to sign arbitrary subscriber certificates, thus allowing an attacker to convincingly impersonate any secure website on the internet.

At the time of the 2008 discovery, Netcraft’s SSL Survey showed that 14% of all SSL certificates were signed using the vulnerable MD5 algorithm.

A few months later, the developers of Google Chrome suggested that some browser developers would be dropping support for MD5-signed certificates at some point; however, given the number of sites still using MD5-signed certificates, it was thought that suddenly removing support for such certificates would have a undesirably large impact on users.

As the majority of MD5-signed certificates have since expired or been replaced, browser vendors and certificate authorities have been gradually phasing out support for such certificates. Apple removed support for MD5-signed certificates in an iOS 5 update last year, and Chrome’s developers subsequently revisited the issue and revised their browser to display an interstitial warning about MD5 being a weak signature algorithm. This immediately caused problems for users of certain corporate proxies, where a man-in-the-middle approach was used to decrypt SSL traffic before presenting it to the client with a trusted MD5-signed certificate.

The CA GeoTrust has added the affected certificates to its certificate revocation lists at http://www.geotrust.com/resources/repository/crls/, which has resulted in the certificates being rejected as invalid in many of today’s browsers, including Chrome, Opera and Internet Explorer. However, sites which currently use MD5-signed certificates can be viewed with the latest version of Mozilla Firefox without receiving any warnings, as the relevant certificate revocation lists have to be added manually, and none of the certificates specifies an OCSP server for checking the revocation status.

The CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates [pdf] no longer allow the MD5 digest algorithm to be used for root, subordinate or subscriber certificates. All but two of the 1,123 unique MD5-signed certificates still in use on the web were issued by Equifax between 2006 and 2008, with validity periods ranging between 4 and 6 years.

The remaining two MD5-signed certificates were issued by VeriSign. These do not appear to have been revoked, but are due to expire in less than a month. In the worst case, all MD5-signed certificates currently in use on the web will have expired naturally by March 2014, regardless of whatever measures have been taken by browser vendors and certificate authorities.

Several government websites are currently operating with MD5-signed certificates, including a few in Australia, a couple in New Zealand, and one in each of Ireland and the UK. The most recently issued certificates are marked as being valid from 30th December 2008 – the same day as the publication of the hash collision demonstration.

Other notable users of weak MD5-signed certificates include Reliance Bank, Commencement Bank, several online billing websites, dozens of corporate webmail services, purportedly secure hosting providers, a number of schools and universities, and even a reseller of GeoTrust SSL certificates.

└ Tags: Around the Net, security
 Comment 

Debian: 2535-1: rtfm: cross-site scripting

Aug31
by Ike on August 31, 2012 at 3:36 am
Posted In: Uncategorized

(Aug 29) It was discovered that rtfm, the Request Tracker FAQ Manager, contains multiple cross-site scripting vulnerabilities in the topic administration page. [More…]

└ Tags: site
 Comment 

Ubuntu: 1548-1: Firefox vulnerabilities

Aug31
by Ike on August 31, 2012 at 3:07 am
Posted In: Uncategorized

(Aug 29) Multiple security issues were fixed in Firefox.

 Comment 
  • Page 2,849 of 2,984
  • « First
  • «
  • 2,847
  • 2,848
  • 2,849
  • 2,850
  • 2,851
  • »
  • Last »

What’s New?

  • Fedora 42: mingw-libsoup Critical Out-of-Bounds Read CVE-2025-11021
  • Fedora 42: mingw-python3 Critical Denial Service Fix CVE-2025-12084
  • Fedora 42 pgadmin4 Critical Remote Code Exec Fix 2025-b08763f674
  • Fedora: Gobuster Critical Update Released for CVE-2025-58188 Advisory
  • Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294
  • Debian Trixie WordPress Security Advisory DSA-6091-1 for CVE-2025-58246
  • Debian: Chromium Important Code Exec and Info Disclosure DSA-6089-1
  • Debian Trixie: php8.4 Important DoS Memory Disclosure DSA-6088-1
  • Fedora 42: uriparser CVE-2025-67899 Fix for Unbounded Recursion Issue
  • Fedora 42: util-linux Critical Buffer Overflow CVE-2025-14104 Advisory
  • Fedora 42: mqttcli Update 0.2.8 Critical Integer Overflow Issues
  • Fedora 42: Chromium High CVE-2025-14765 Out of Bounds Security Risks
  • Debian: Roundcube Important XSS and Information Leak Fix DSA-6087-1
  • Debian: MediaWiki DSA-6085-1 Security Updates for DoS and XSS
  • Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282
  • Plesk 2025: A Year in Review
  • Ubuntu 24.04: Linux Xilinx Important Kernel Security Fix USN-7931-4
  • Ubuntu 22.04 LTS: Linux Kernel Critical Fix for Raspberry Pi USN-7928-4
  • Ubuntu 18.04 LTS – Oracle Kernel Critical Security Flaws USN-7922-3
  • Ubuntu 24.04: Advisory USN-7921-2 for Real-time Kernel CVE-2025-39946
  • Debian Trixie: c-ares Critical Denial of Service Advisory DSA-6084-1
  • Debian: webkit2gtk Important Memory Corruption Issues DSA-6083-1
  • Fedora 42: brotli 1.2.0 Critical DoS Fix FEDORA-2025-9e233a4e22
  • Fedora 42: perl-Alien-Brotli Faces Critical Denial-of-Service Risk
  • Fedora 42: CUPS Critical Local DoS Issue FEDORA-2025-c09b980696

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

52 queries. 8.75 mb Memory usage. 0.254 seconds.