New Allaire Security Zone Bulletins Posted

2000-10-24T00:00:00
ID SECURITYVULNS:DOC:818
Type securityvulns
Reporter Securityvulns
Modified 2000-10-24T00:00:00

Description

Dear Allaire Customer --

New security issues that may affect Allaire customers have recently come to our attention. Please visit the Security Zone at the Allaire Web site to learn about these new issues and what actions you can take to address them:

http://www.allaire.com/security

This week we posted the following new Allaire Security Bulletins:

ADDED:

ASB00-26: Microsoft (MS00-078): Patch Available for "Web Server Folder Traversal" Vulnerability Affects: Microsoft Internet Information Server 4.0 Microsoft Internet Information Server 5.0

ASB00-27: JRun 3.0: Patch available for "extra leading slash" security issue Affects: JRun 3.0 (all editions) JRun 3.0 SP1 (all editions)

ASB00-28: JRun 2.3.3: Patch available for "non-webroot requests" security issue Affects: JRun 2.3.3 (all editions)

ASB00-29: JRun 2.3.3: Patch available for "JSP execution of arbitrary file" security issue Affects: JRun 2.3.3 (all editions)

As a Web application platform vendor, one of our highest concerns is the security of the systems our customers deploy. We understand how important security is to our customers, and we're committed to providing the technology and information customers need to build secure Web applications. Thank you for your time and consideration on this issue.

-- Security Response Team, Allaire Corporation

P.S. As a reminder, Allaire has set up an email address that customers can use to report security issues associated with an Allaire product: secure@allaire.com

====================================================================================== Allaire respects the Web and the privacy of those who use it. If you do not want to receive any future messages from Allaire please forward this email to remove@allaire.com with the subject "REMOVE". ======================================================================================