Information Security News mailing list archives
Secunia Weekly Summary - Issue: 2009-23
From: InfoSec News <alerts () infosecnews org>
Date: Fri, 5 Jun 2009 04:04:44 -0500 (CDT)
========================================================================
The Secunia Weekly Advisory Summary
2009-05-28 - 2009-06-04
This week: 64 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers
========================================================================
1) Word From Secunia:
Meet us at the Gartner Information Security Summit in Washington D.C.
Secunia will be sponsoring and showcasing our commercial solutions at
the Gartner IT Security Summit, in Washington D.C. from the 28th of
June 2009 - 1st of July 2009.
Come and meet our representatives at booth 36 and gain valuable insight
on our Vulnerability Intelligence solutions, as well as our application
scanning capabilities.
Book a meeting with a Secunia representative at the Gartner IT Security
Summit!
Please send an email to: partners () secunia com
* Did you know that Secunia last year was the most active research
house and is recognized as the leading Vulnerability
Intelligence Provider?
* Did you know that Secunia today has 1.5 million active users of
the Secunia PSI.
PSI download:
http://secunia.com/vulnerability_scanning/personal/
Are you sure you have all latest vulnerability intelligence research
required to secure your systems?
Click here to request a 10 day trial now:
http://secunia.com/advisories/try_vi/
========================================================================
2) This Week in Brief:
A vulnerability has been reported in Apple iTunes, which can be
exploited by malicious people to compromise a user's system.
For more information, refer to:
http://secunia.com/advisories/35314/
--
Some vulnerabilities have been reported in Apple QuickTime, which can
be exploited by malicious people to compromise a user's system.
For more information, refer to:
http://secunia.com/advisories/35091/
--
A vulnerability has been reported in Microsoft DirectX, which can be
exploited by malicious people to compromise a user's system.
For more information, refer to:
http://secunia.com/advisories/35268/
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA34924] Adobe Reader JavaScript Methods Memory Corruption
2. [SA35268] Microsoft DirectShow QuickTime Parsing Arbitrary Code
Execution
3. [SA35091] Apple QuickTime Multiple Vulnerabilities
4. [SA34012] Adobe Flash Player Multiple Vulnerabilities
5. [SA28713] Facebook Photo Uploader ActiveX Control Property Handling
Buffer Overflow
6. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
7. [SA24314] Internet Explorer Charset Inheritance Cross-Site
Scripting Vulnerability
8. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
9. [SA33954] Microsoft Excel Two Vulnerabilities
10. [SA35314] Apple iTunes Protocol Handler Buffer Overflow
Vulnerability
========================================================================
4) This Week in Numbers
During the past week 64 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.
This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:
Platforms:
Windows : 11 Secunia Advisories
Unix/Linux : 25 Secunia Advisories
Other : 3 Secunia Advisories
Cross platform : 25 Secunia Advisories
Criticality Ratings:
Extremely Critical : 1 Secunia Advisory
Highly Critical : 10 Secunia Advisories
Moderately Critical : 33 Secunia Advisories
Less Critical : 15 Secunia Advisories
Not Critical : 5 Secunia Advisories
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Subscribe:
http://secunia.com/advisories/weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support () secunia com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
_____________________________________________
Visit the InfoSec News security bookstore!
http://www.shopinfosecnews.org
Current thread:
- Secunia Weekly Summary - Issue: 2009-23 InfoSec News (Jun 05)
