<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Java vulnerability, CVE-2013-0422, released 1/11/13 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43967#M32280</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get this content release 349 to successfully protect against these threats, what threat categories do we need to enable and apply policy (Virus / Spyware / Vulneability)? Because we just recently implemented the PA's and we dont' know the impact of turning all these categories to block right now. Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jan 2013 21:28:13 GMT</pubDate>
    <dc:creator>asher1ad</dc:creator>
    <dc:date>2013-01-11T21:28:13Z</dc:date>
    <item>
      <title>New Java vulnerability, CVE-2013-0422, released 1/11/13</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43964#M32277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering if anyone might be able to tell me whether this vulnerability, CVE-2013-0422, is being addressed? And, if so, when could we expect to see a patch for this? Thank you!&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0422&amp;amp;utm_source=dlvr.it&amp;amp;utm_medium=twitter"&gt;&lt;SPAN style="color: #0066cc; text-decoration: underline;"&gt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0422&amp;amp;utm_source=dlvr.it&amp;amp;utm_medium=tw&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://msisac.cisecurity.org/advisories/2013/2013-006.cfm"&gt;http://msisac.cisecurity.org/advisories/2013/2013-006.cfm&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 15:17:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43964#M32277</guid>
      <dc:creator>u13987</dc:creator>
      <dc:date>2013-01-11T15:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: New Java vulnerability, CVE-2013-0422, released 1/11/13</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43965#M32278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Content release version 349 has been released today to cover this &lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;New Vulnerability &lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 18:53:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43965#M32278</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-01-11T18:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: New Java vulnerability, CVE-2013-0422, released 1/11/13</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43966#M32279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the prompt reply! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 18:57:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43966#M32279</guid>
      <dc:creator>u13987</dc:creator>
      <dc:date>2013-01-11T18:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: New Java vulnerability, CVE-2013-0422, released 1/11/13</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43967#M32280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get this content release 349 to successfully protect against these threats, what threat categories do we need to enable and apply policy (Virus / Spyware / Vulneability)? Because we just recently implemented the PA's and we dont' know the impact of turning all these categories to block right now. Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 21:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43967#M32280</guid>
      <dc:creator>asher1ad</dc:creator>
      <dc:date>2013-01-11T21:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: New Java vulnerability, CVE-2013-0422, released 1/11/13</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43968#M32281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are all by the category "critical". So if you at least set "critical" to default action: block (instead of default) you should be safe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking using this profile is recommended:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;critical: block&lt;/P&gt;&lt;P&gt;high: block&lt;/P&gt;&lt;P&gt;medium: block&lt;/P&gt;&lt;P&gt;low: default&lt;/P&gt;&lt;P&gt;informational: default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default means the default action that PA has set for this vuln.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;critical 35273 Oracle Java Runtime Environment Remote Code Execution Vulnerability CVE-2013-0422&amp;nbsp; reset-client 3.1.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means that if detected the default action is "reset-client" (which includes a logentry aswell).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;critical 35276 Adobe Reader JPEG File Parsing Memory Corruption Vulnerability CVE-2013-0603 APSB13-02 alert 3.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means that the default action is to only produce a logentry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you set the default action for critical to block then both above will block (drop) the session if detected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the 349 update only updates vuln signatures (the IPS stuff).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 22:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-java-vulnerability-cve-2013-0422-released-1-11-13/m-p/43968#M32281</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-11T22:07:18Z</dc:date>
    </item>
  </channel>
</rss>

