RealNetworks has released updated version of their RealPlayer. New version contains fixes to 19 vulnerabilities.
Affected software: Windows RealPlayer prior 15.0.0 version
Users of affected versions are advised to update their RealPlayer to the latest one available. More information can be read from related security advisory.
Monday, November 21, 2011
ESET Global Threat Report for October 2011
ESET has released a report discussing global threats of October 2011.
TOP 10 threats list (previous ranking listed too):
1. INF/Autorun (1.)
2. Win32/Dorkbot (3.)
3. Win32/Conficker (2.)
4. HTML/ScrInject.B (7.)
5. Win32/Sality (4.)
6. HTML/Iframe.B (5.)
7. Win32/Autoit (6.)
8. Win32/Ramnit (8.)
9. JS/TrojanDownloader.Iframe.NKE (10.)
10. Win32/PSW.OnLineGames (9.)
Complete report (with a description about each of the above listed threats) can be downloaded here (in PDF format).
TOP 10 threats list (previous ranking listed too):
1. INF/Autorun (1.)
2. Win32/Dorkbot (3.)
3. Win32/Conficker (2.)
4. HTML/ScrInject.B (7.)
5. Win32/Sality (4.)
6. HTML/Iframe.B (5.)
7. Win32/Autoit (6.)
8. Win32/Ramnit (8.)
9. JS/TrojanDownloader.Iframe.NKE (10.)
10. Win32/PSW.OnLineGames (9.)
Complete report (with a description about each of the above listed threats) can be downloaded here (in PDF format).
Thursday, November 17, 2011
Patched iTunes Available
Apple has released version 10.5.1 of their iTunes media player. New version fixes a security issue that could allow a man-in-the-middle attack (CVE-2008-3434). Latest version can be downloaded here.
More information about the update can be read from related security bulletin.
More information about the update can be read from related security bulletin.
Friday, November 11, 2011
Update For Adobe Flash Player
Adobe has released updated version of their Flash Player. The new version fixes some critical categorized vulnerabilities:
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2445)
- a heap corruption vulnerability that could lead to code execution (CVE-2011-2450)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2451)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2452)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2453)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2454)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2455)
- a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456)
- a stack overflow vulnerability that could lead to code execution (CVE-2011-2457)
- a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2459)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2460)
Users of Adobe Flash Player 11.0.1.152 and earlier should update to Adobe Flash Player 11.1.102.55. Also, users of Adobe AIR version 3.0 and earlier should update to Adobe AIR 3.1.0.4880.
More information can be read from Adobe's security bulletin.
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2445)
- a heap corruption vulnerability that could lead to code execution (CVE-2011-2450)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2451)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2452)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2453)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2454)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2455)
- a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456)
- a stack overflow vulnerability that could lead to code execution (CVE-2011-2457)
- a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2459)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2460)
Users of Adobe Flash Player 11.0.1.152 and earlier should update to Adobe Flash Player 11.1.102.55. Also, users of Adobe AIR version 3.0 and earlier should update to Adobe AIR 3.1.0.4880.
More information can be read from Adobe's security bulletin.
Chrome Update Available
Update For Chrome Available
Google has released a new version of their Chrome web browser. Version 15.0.874.120 contains fixes to seven vulnerabilities of which five are high, one medium and one low categorized.
More information in Google Chrome Releases blog.
Google has released a new version of their Chrome web browser. Version 15.0.874.120 contains fixes to seven vulnerabilities of which five are high, one medium and one low categorized.
More information in Google Chrome Releases blog.
Thursday, November 10, 2011
Security Updates From Mozilla
Mozilla has released updates to Firefox browser and Thunderbird email client to address a bunch of vulnerabilities of which many are categorized as critical.
Affected products are:
- Mozilla Thunderbird earlier than 8.0 or 3.1.16
- Mozilla Firefox earlier than 8.0 or 3.6.24
Links to the security advisories with details about addressed security issues:
MFSA 2011-52 Code execution via NoWaiverWrapper
MFSA 2011-51 Cross-origin image theft on Mac with integrated Intel GPU
MFSA 2011-50 Cross-origin data theft using canvas and Windows D2D
MFSA 2011-49 Memory corruption while profiling using Firebug
MFSA 2011-48 Miscellaneous memory safety hazards (rv:8.0)
MFSA 2011-47 Potential XSS against sites using Shift-JIS
MFSA 2011-46 loadSubScript unwraps XPCNativeWrapper scope parameter (1.9.2 branch)
Fresh versions can be obtained via inbuilt updater or by downloading from the product site:
Firefox
Thunderbird
Affected products are:
- Mozilla Thunderbird earlier than 8.0 or 3.1.16
- Mozilla Firefox earlier than 8.0 or 3.6.24
Links to the security advisories with details about addressed security issues:
MFSA 2011-52 Code execution via NoWaiverWrapper
MFSA 2011-51 Cross-origin image theft on Mac with integrated Intel GPU
MFSA 2011-50 Cross-origin data theft using canvas and Windows D2D
MFSA 2011-49 Memory corruption while profiling using Firebug
MFSA 2011-48 Miscellaneous memory safety hazards (rv:8.0)
MFSA 2011-47 Potential XSS against sites using Shift-JIS
MFSA 2011-46 loadSubScript unwraps XPCNativeWrapper scope parameter (1.9.2 branch)
Fresh versions can be obtained via inbuilt updater or by downloading from the product site:
Firefox
Thunderbird
Labels:
Firefox,
security,
thunderbird,
update,
vulnerability
Adobe Shockwave Player Updated
Adobe has released updated version of their Shockwave Player. The new version fixes several security vulnerabilities. The update is categorized as critical.
Users of Adobe Shockwave Player 11.6.1.629 and earlier should update to Adobe Shockwave Player 11.6.3.633.
More about fixed vulnerabilities and other information can be read from Adobe's security bulletin.
Users of Adobe Shockwave Player 11.6.1.629 and earlier should update to Adobe Shockwave Player 11.6.3.633.
More about fixed vulnerabilities and other information can be read from Adobe's security bulletin.
Labels:
adobe,
security,
shockwave player,
update,
vulnerability
Tuesday, November 8, 2011
Microsoft Security Updates For November 2011
Microsoft has released security updates for November 2011. This month update contains four security bulletins of which one critical, two important and one moderate.
A new version of Windows Malicious Software Removal Tool (MSRT) was released too.
More information can be read from the bulletin summary.
For consumer the easist way to get the update is to use Microsoft Update service.
A new version of Windows Malicious Software Removal Tool (MSRT) was released too.
More information can be read from the bulletin summary.
For consumer the easist way to get the update is to use Microsoft Update service.
Friday, November 4, 2011
Unpatched Vulnerability in TrueType Font Parsing
Microsoft is investigating a vulnerability in a Windows component, the Win32k TrueType font parsing engine. By exploiting the vulnerability an attacker may be able to run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft is aware of targeted attacks that try to exploit this vulnerability. Duqu malware is reported to be exploiting the vulnerability.
At the moment there is no patch against the vulnerability available. However, has listed some workarounds to mitigate the problem. More information about this can be read from the Microsoft Security Advisory (2639658).
At the moment there is no patch against the vulnerability available. However, has listed some workarounds to mitigate the problem. More information about this can be read from the Microsoft Security Advisory (2639658).
Wednesday, November 2, 2011
Symantec Intelligence Report: October 2011
Symantec has published their Intelligence report that sums up the latest threat trends for October 2011.
Report highlights:
- Spam – 74.2 percent in October (a decrease of 0.6 percentage points since September 2011)
- Phishing – One in 343.1 emails identified as phishing (an increase of 0.07 percentage points since September 2011)
- Malware – One in 235.8 emails in October contained malware (a decrease of 0.11 percentage points since September 2011)
- Malicious Web sites – 3,325 Web sites blocked per day (a decrease of 4.3 percent since September 2011)
- 43.9 percent of all malicious domains blocked were new in October (a decrease of 0.7 percentage points since September 2011)
- 15.2 percent of all Web-based malware blocked was new in October (an increase of 0.7 percentage points since September 2011)
- Spammers setting up more URL shortening services
- Social engineering example from the East
- New Symantec Research: W32.Duqu - Precursor to the Next Stuxnet
- New Symantec Research: The Motivations of Recent Android Malware
- Best Practices for Enterprises and Users
The report can be viewed here.
Report highlights:
- Spam – 74.2 percent in October (a decrease of 0.6 percentage points since September 2011)
- Phishing – One in 343.1 emails identified as phishing (an increase of 0.07 percentage points since September 2011)
- Malware – One in 235.8 emails in October contained malware (a decrease of 0.11 percentage points since September 2011)
- Malicious Web sites – 3,325 Web sites blocked per day (a decrease of 4.3 percent since September 2011)
- 43.9 percent of all malicious domains blocked were new in October (a decrease of 0.7 percentage points since September 2011)
- 15.2 percent of all Web-based malware blocked was new in October (an increase of 0.7 percentage points since September 2011)
- Spammers setting up more URL shortening services
- Social engineering example from the East
- New Symantec Research: W32.Duqu - Precursor to the Next Stuxnet
- New Symantec Research: The Motivations of Recent Android Malware
- Best Practices for Enterprises and Users
The report can be viewed here.
Subscribe to:
Posts (Atom)