Information Security News mailing list archives
Secunia Weekly Summary - Issue: 2009-19
From: InfoSec News <alerts () infosecnews org>
Date: Fri, 8 May 2009 04:01:02 -0500 (CDT)
========================================================================
The Secunia Weekly Advisory Summary
2009-04-30 - 2009-05-07
This week: 47 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers
========================================================================
1) Word From Secunia:
Are you missing:
* Vulnerabilities Summary Listing
Example:
[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability
* Vulnerabilities Content Listing
Example:
Windows:
[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2006-04-11
A vulnerability has been reported in Microsoft Data Access Components
(MDAC), which can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/19583/
This intelligence is part of the Secunia Vulnerability Intelligence
Feed.
Get:
* Customised Intelligence. No more irrelevant alerts.
* Access to Secunia Support.
* Access to the Secunia vulnerability database.
* Access to updated vulnerability intelligence that you are missing out
on.
Features also include:
* XML Feed capability.
* Multiple user accounts capability.
* Ticketing System capability.
Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/
Click here to trial our solutions:
http://secunia.com/advisories/try_vi/
========================================================================
2) This Week in Brief:
Some vulnerabilities have been reported in Google Chrome, which can
potentially be exploited by malicious people to compromise a user's
system.
For more information, refer to:
http://secunia.com/advisories/35014/
--
Secunia Research has discovered a vulnerability in Garmin Communicator
Plug-In, which can be exploited by malicious people to bypass certain
security restrictions.
For more information, refer to:
http://secunia.com/advisories/34326/
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA34012] Adobe Flash Player Multiple Vulnerabilities
2. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
3. [SA34924] Adobe Reader JavaScript Methods Memory Corruption
4. [SA34866] Mozilla Firefox "nsTextFrame::ClearTextRun()" Memory
Corruption
5. [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
6. [SA33954] Microsoft Excel Two Vulnerabilities
7. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
8. [SA32604] IBM Tivoli Storage Manager Multiple Vulnerabilities
9. [SA23655] Microsoft XML Core Services Multiple Vulnerabilities
10. [SA34977] Linux Kernel "ptrace_attach()" Privilege Escalation
Vulnerability
========================================================================
4) This Week in Numbers
During the past week 47 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.
This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:
Platforms:
Windows : 4 Secunia Advisories
Unix/Linux : 27 Secunia Advisories
Other : 0 Secunia Advisories
Cross platform : 16 Secunia Advisories
Criticality Ratings:
Extremely Critical : 0 Secunia Advisories
Highly Critical : 7 Secunia Advisories
Moderately Critical : 20 Secunia Advisories
Less Critical : 12 Secunia Advisories
Not Critical : 8 Secunia Advisories
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Subscribe:
http://secunia.com/advisories/weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support () secunia com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
--
LayerOne 2009, Information Security for the discerning professional.
May 23-24 2009 @ The Anaheim Marriott in Anaheim, California
Visit http://layerone.info for more information
Current thread:
- Secunia Weekly Summary - Issue: 2009-19 InfoSec News (May 08)
