---------------------------------------------------------------------- Accurate Vulnerability Scanning No more false positives, no more false negatives http://secunia.com/vulnerability_scanning/ ---------------------------------------------------------------------- TITLE: IBM OS/400 TLS Session Renegotiation Plaintext Injection SECUNIA ADVISORY ID: SA38157 VERIFY ADVISORY: http://secunia.com/advisories/38157/ DESCRIPTION: IBM has acknowledged a vulnerability in IBM OS/400, which can be exploited by malicious people to manipulate certain data. This is related to: SA37291 SOLUTION: Please see the vendor's advisory for more information regarding recommended PTFs. ORIGINAL ADVISORY: IBM (MF48225, MF48292, MF48293, MF48295, SI37210, SI37319, SI37331, SI36930, SI37297, SI37216, SI37320, SI37327, SI36936, SI36931, SI37300, SI37299, SI37605, SI36891, SI36892). http://www-01.ibm.com/support/docview.wss?uid=nas258cbfcf0a5645af7862576710041f65e OTHER REFERENCES: SA37291: http://secunia.com/advisories/37291/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------