Monday, November 21, 2011

Security Patch For RealPlayer

RealNetworks has released updated version of their RealPlayer. New version contains fixes to 19 vulnerabilities.

Affected software: Windows RealPlayer prior 15.0.0 version

Users of affected versions are advised to update their RealPlayer to the latest one available. More information can be read from related security advisory.

ESET Global Threat Report for October 2011

ESET has released a report discussing global threats of October 2011.

TOP 10 threats list (previous ranking listed too):

1. INF/Autorun (1.)
2. Win32/Dorkbot (3.)
3. Win32/Conficker (2.)
4. HTML/ScrInject.B (7.)
5. Win32/Sality (4.)
6. HTML/Iframe.B (5.)
7. Win32/Autoit (6.)
8. Win32/Ramnit (8.)
9. JS/TrojanDownloader.Iframe.NKE (10.)
10. Win32/PSW.OnLineGames (9.)


Complete report (with a description about each of the above listed threats) can be downloaded here (in PDF format).

Thursday, November 17, 2011

Patched iTunes Available

Apple has released version 10.5.1 of their iTunes media player. New version fixes a security issue that could allow a man-in-the-middle attack (CVE-2008-3434). Latest version can be downloaded here.

More information about the update can be read from related security bulletin.

Friday, November 11, 2011

Update For Adobe Flash Player

Adobe has released updated version of their Flash Player. The new version fixes some critical categorized vulnerabilities:
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2445)
- a heap corruption vulnerability that could lead to code execution (CVE-2011-2450)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2451)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2452)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2453)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2454)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2455)
- a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456)
- a stack overflow vulnerability that could lead to code execution (CVE-2011-2457)
- a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2459)
- a memory corruption vulnerability that could lead to code execution (CVE-2011-2460)

Users of Adobe Flash Player 11.0.1.152 and earlier should update to Adobe Flash Player 11.1.102.55. Also, users of Adobe AIR version 3.0 and earlier should update to Adobe AIR 3.1.0.4880.

More information can be read from Adobe's security bulletin.

Chrome Update Available

Update For Chrome Available
Google has released a new version of their Chrome web browser. Version 15.0.874.120 contains fixes to seven vulnerabilities of which five are high, one medium and one low categorized.

More information in Google Chrome Releases blog.

Thursday, November 10, 2011

Security Updates From Mozilla

Mozilla has released updates to Firefox browser and Thunderbird email client to address a bunch of vulnerabilities of which many are categorized as critical.

Affected products are:
- Mozilla Thunderbird earlier than 8.0 or 3.1.16
- Mozilla Firefox earlier than 8.0 or 3.6.24

Links to the security advisories with details about addressed security issues:
MFSA 2011-52 Code execution via NoWaiverWrapper
MFSA 2011-51 Cross-origin image theft on Mac with integrated Intel GPU
MFSA 2011-50 Cross-origin data theft using canvas and Windows D2D
MFSA 2011-49 Memory corruption while profiling using Firebug
MFSA 2011-48 Miscellaneous memory safety hazards (rv:8.0)
MFSA 2011-47 Potential XSS against sites using Shift-JIS
MFSA 2011-46 loadSubScript unwraps XPCNativeWrapper scope parameter (1.9.2 branch)

Fresh versions can be obtained via inbuilt updater or by downloading from the product site:
Firefox
Thunderbird

Adobe Shockwave Player Updated

Adobe has released updated version of their Shockwave Player. The new version fixes several security vulnerabilities. The update is categorized as critical.

Users of Adobe Shockwave Player 11.6.1.629 and earlier should update to Adobe Shockwave Player 11.6.3.633.

More about fixed vulnerabilities and other information can be read from Adobe's security bulletin.

Tuesday, November 8, 2011

Microsoft Security Updates For November 2011

Microsoft has released security updates for November 2011. This month update contains four security bulletins of which one critical, two important and one moderate.

A new version of Windows Malicious Software Removal Tool (MSRT) was released too.

More information can be read from the bulletin summary.

For consumer the easist way to get the update is to use Microsoft Update service.

Friday, November 4, 2011

Unpatched Vulnerability in TrueType Font Parsing

Microsoft is investigating a vulnerability in a Windows component, the Win32k TrueType font parsing engine. By exploiting the vulnerability an attacker may be able to run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft is aware of targeted attacks that try to exploit this vulnerability. Duqu malware is reported to be exploiting the vulnerability.

At the moment there is no patch against the vulnerability available. However, has listed some workarounds to mitigate the problem. More information about this can be read from the Microsoft Security Advisory (2639658).

Wednesday, November 2, 2011

Symantec Intelligence Report: October 2011

Symantec has published their Intelligence report that sums up the latest threat trends for October 2011.

Report highlights:
- Spam – 74.2 percent in October (a decrease of 0.6 percentage points since September 2011)
- Phishing – One in 343.1 emails identified as phishing (an increase of 0.07 percentage points since September 2011)
- Malware – One in 235.8 emails in October contained malware (a decrease of 0.11 percentage points since September 2011)
- Malicious Web sites – 3,325 Web sites blocked per day (a decrease of 4.3 percent since September 2011)
- 43.9 percent of all malicious domains blocked were new in October (a decrease of 0.7 percentage points since September 2011)
- 15.2 percent of all Web-based malware blocked was new in October (an increase of 0.7 percentage points since September 2011)
- Spammers setting up more URL shortening services
- Social engineering example from the East
- New Symantec Research: W32.Duqu - Precursor to the Next Stuxnet
- New Symantec Research: The Motivations of Recent Android Malware
- Best Practices for Enterprises and Users


The report can be viewed here.