This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Zero-Day-Alarm für JBoss

Hi,

es existiert ein Zero-Day-Alarm für JBoss

http://de.slideshare.net/frohoff1/appseccali-2015-marshalling-pickles

http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/

http://www.heise.de/security/meldung/Zero-Day-Alarm-fuer-viele-Server-mit-Java-2913605.html

Auf unserem Server mit Sopohos Mobil Control existiert die Datei commons-collections-3.2.1.jar

Anfängerfrage: wie reagieren die eingebundenen Smartphones, wenn ich dem Server Port 80/443 abdrehe?

Gibt es Empfehlungen von Sophos, wie man vorgehen sollte (habe in der Knowledge Base nichts gefunden)?

Ist zeitnah mit einem Patch zu rechnen?

Danke!



This thread was automatically locked due to age.
  • No answer?
    You offer German when I open a new thread ...

    The question is how to deal with the Zero-Day Alert in Apache Commons Collections.
    On a server with Mobil Control there is the file commons-collection-3.2.1.jar

    First question: what happens to the mobil phones when I disable port 80/443? Do they still work?
    Is there any recommendation from Sophos how to deal with that?
    Will there be a patch, soon?

    Many thanks for your help!
  • Really important for me too, some customers were asking for solutions about this problem, please provide help.

    Thanks a lot.
  • Hello,

    Sophos Mobile Control is not affected by this vulnerability.
    Although Sophos Mobile Control uses jBoss/Wildfly the affected part is not exposed/used in Sophos Mobile Control.

    Regards
    Thomas