Mozilla has released updates to Firefox and Seamonkey browsers and Thunderbird email client to address a bunch of vulnerabilities of which several categorized as critical.
Affected products are:
- Mozilla Thunderbird earlier than 7.0
- Mozilla SeaMonkey earlier than 2.4
- Mozilla Firefox earlier than 7.0 or 3.6.23
Links to the security advisories with details about addressed security issues:
MFSA 2011-45 Inferring Keystrokes from motion data
MFSA 2011-44 Use after free reading OGG headers
MFSA 2011-43 loadSubScript unwraps XPCNativeWrapper scope parameter
MFSA 2011-42 Potentially exploitable crash in the YARR regular expression library
MFSA 2011-41 Potentially exploitable WebGL crashes
MFSA 2011-40 Code installation through holding down Enter
MFSA 2011-39 Defense against multiple Location headers due to CRLF Injection
MFSA 2011-38 XSS via plugins and shadowed window.location object
MFSA 2011-37 Integer underflow when using JavaScript RegExp
MFSA 2011-36 Miscellaneous memory safety hazards (rv:7.0 / rv:1.9.2.23)
Fresh versions can be obtained via inbuilt updater or by downloading from the product site:
Firefox
Thunderbird
SeaMonkey
Friday, September 30, 2011
Tuesday, September 27, 2011
Microsoft Security Advisory 2588513
Microsoft has released a security advisory (2588513) discussing a new vulnerability reported in SSL 3.0 and TLS 1.0. "This vulnerability affects the protocol itself and is not specific to the Windows operating system. This is an information disclosure vulnerability that allows the decryption of encrypted SSL/TLS traffic. This vulnerability primarily impacts HTTPS traffic, since the browser is the primary attack vector, and all web traffic served via HTTPS or mixed content HTTP/HTTPS is affected. We are not aware of a way to exploit this vulnerability in other protocols or components and we are not aware of attacks that try to use the reported vulnerability at this time. Considering the attack scenario, this vulnerability is not considered high risk to customers."
More information:
Microsoft Security Advisory 2588513
Is SSL broken? – More about Security Advisory 2588513
More information:
Microsoft Security Advisory 2588513
Is SSL broken? – More about Security Advisory 2588513
Thursday, September 22, 2011
Security Update For Adobe Flash Player
Adobe has released an updated version of their Flash Player. The new version fixes critical vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. Adobe states that there are reports that one of these vulnerabilities (CVE-2011-2444) is being exploited in the wild in targeted attacks via malicious web pages.
Affected versions:
-Users of Adobe Flash Player 10.3.183.7 and earlier are recommended to get update 10.3.183.10
-Users of Flash Player 10.3.186.6 and earlier for Android are recommended to get update 10.3.186.7
-Flash Player integrated with Google Chrome will be updated by Google via Chrome update.
More information can be read from Adobe's security bulletin.
Affected versions:
-Users of Adobe Flash Player 10.3.183.7 and earlier are recommended to get update 10.3.183.10
-Users of Flash Player 10.3.186.6 and earlier for Android are recommended to get update 10.3.186.7
-Flash Player integrated with Google Chrome will be updated by Google via Chrome update.
More information can be read from Adobe's security bulletin.
Tuesday, September 20, 2011
New Chrome Version Released
Google has released a new version of their Chrome web browser. Version 14.0.835.163 contains fixes to 32 vulnerabilities of which some may allow an attacker to execute arbitrary code in target system.
More information in Google Chrome Releases blog.
More information in Google Chrome Releases blog.
Wednesday, September 14, 2011
Adobe Reader And Acrobat Security Updates
Adobe has released security updates for its PDF products, Adobe Reader and Adobe Acrobat.
Affected versions:
*of series X (10.x)
Adobe Reader 10.1 and earlier
Adobe Acrobat 10.1 and earlier
*of series 9.x
Adobe Reader 9.4.5 and earlier
Adobe Acrobat 9.4.5 and earlier
*of series 8.x
Adobe Reader 8.3 and earlier
Adobe Acrobat 8.3 and earlier
Users of vulnerable versions are instructed to update their versions either by using automatic update functionality or by downloading fresh version manually. The default installation configuration runs automatic updates on a regular schedule and can be manually activated by choosing Help > Check for Updates.
Those who want to upgrade manually, can download the latest versions of the links below:
Adobe Reader
Acrobat Standard and Pro
Acrobat Pro Extended
Acrobat 3D
More information about fixed vulnerabilities can be read from Adobe's security bulletin.
Affected versions:
*of series X (10.x)
Adobe Reader 10.1 and earlier
Adobe Acrobat 10.1 and earlier
*of series 9.x
Adobe Reader 9.4.5 and earlier
Adobe Acrobat 9.4.5 and earlier
*of series 8.x
Adobe Reader 8.3 and earlier
Adobe Acrobat 8.3 and earlier
Users of vulnerable versions are instructed to update their versions either by using automatic update functionality or by downloading fresh version manually. The default installation configuration runs automatic updates on a regular schedule and can be manually activated by choosing Help > Check for Updates.
Those who want to upgrade manually, can download the latest versions of the links below:
Adobe Reader
Acrobat Standard and Pro
Acrobat Pro Extended
Acrobat 3D
More information about fixed vulnerabilities can be read from Adobe's security bulletin.
Tuesday, September 13, 2011
Microsoft Security Updates For September 2011
Microsoft has released security updates for September 2011. This month update contains five important catagorized security bulletins.
A new version of Windows Malicious Software Removal Tool (MSRT) was released too.
More information can be read from the bulletin summary.
For consumer the easist way to get the update is to use Microsoft Update service.
A new version of Windows Malicious Software Removal Tool (MSRT) was released too.
More information can be read from the bulletin summary.
For consumer the easist way to get the update is to use Microsoft Update service.
Saturday, September 10, 2011
ESET Global Threat Report for August 2011
ESET has released a report discussing global threats of August 2011.
TOP 10 threats list (previous ranking listed too):
1. INF/Autorun (1.)
2. Win32/Conficker (2.)
3. HTML/Iframe.B.Gen (5.)
4. Win32/Dorkbot (7.)
5. Win32/Sality (3.)
6. HTML/ScrInject.B (6.)
7. Win32/Autoit (8.)
8. Win32/PSW.OnLineGames (4.)
9. JS/TrojanDownloader.Iframe.NKE (-)
10. Win32/Ramnit (41.)
Complete report (with a description about each of the above listed threats) can be downloaded here (in PDF format).
TOP 10 threats list (previous ranking listed too):
1. INF/Autorun (1.)
2. Win32/Conficker (2.)
3. HTML/Iframe.B.Gen (5.)
4. Win32/Dorkbot (7.)
5. Win32/Sality (3.)
6. HTML/ScrInject.B (6.)
7. Win32/Autoit (8.)
8. Win32/PSW.OnLineGames (4.)
9. JS/TrojanDownloader.Iframe.NKE (-)
10. Win32/Ramnit (41.)
Complete report (with a description about each of the above listed threats) can be downloaded here (in PDF format).
Wednesday, September 7, 2011
Ransomware Posing As Microsoft
Security company Panda warns in their blog about a ransomware that tries to trick users to believe their Windows authenticity has failed. To get it fixed users are asked to pay 100€ by following given instructions. Naturally, nothing should be paid. Panda have published a code that can be used to deactivate the malware.
More information in PandaLabs blog.
More information in PandaLabs blog.
Thursday, September 1, 2011
Symantec Intelligence Report: August 2011
Symantec has published their Intelligence report that sums up the latest threat trends for August 2011.
Report highlights:
- Spam – 75.9 percent in August (a decrease of 1.9 percentage points since July 2011)
- Phishing – One in 207.7 emails identified as phishing (an increase of 0.48 percentage points since July 2011)
- Malware – One in 203.3 emails in August contained malware (an increase of 0.14 percentage points since July 2011)
- Malicious Web sites – 3,441 Web sites blocked per day (a decrease of 49.4 percent since July 2011)
- 34.1 percent of all malicious domains blocked were new in August (a decrease of 1.32 percentage points since July 2011)
- 17.3 percent of all Web-based malware blocked was new in August (a decrease of 3.82 percentage points since July 2011)
- Global Debt Crises News Drives Pump-and-Dump Stock Scams
- Are MBR Infections Back in Fashion?
- Phishing Apple’s iDisk
- Phishing Brazilian Brands
- The Truth Behind the Shady RAT
- Spammers take advantage of Unicode normalisation to hide URLs
- Best Practices for Enterprises and Users
The report can be viewed here.
Report highlights:
- Spam – 75.9 percent in August (a decrease of 1.9 percentage points since July 2011)
- Phishing – One in 207.7 emails identified as phishing (an increase of 0.48 percentage points since July 2011)
- Malware – One in 203.3 emails in August contained malware (an increase of 0.14 percentage points since July 2011)
- Malicious Web sites – 3,441 Web sites blocked per day (a decrease of 49.4 percent since July 2011)
- 34.1 percent of all malicious domains blocked were new in August (a decrease of 1.32 percentage points since July 2011)
- 17.3 percent of all Web-based malware blocked was new in August (a decrease of 3.82 percentage points since July 2011)
- Global Debt Crises News Drives Pump-and-Dump Stock Scams
- Are MBR Infections Back in Fashion?
- Phishing Apple’s iDisk
- Phishing Brazilian Brands
- The Truth Behind the Shady RAT
- Spammers take advantage of Unicode normalisation to hide URLs
- Best Practices for Enterprises and Users
The report can be viewed here.
Subscribe to:
Posts (Atom)