Information Security News mailing list archives
Secunia Weekly Summary - Issue: 2009-21
From: InfoSec News <alerts () infosecnews org>
Date: Tue, 26 May 2009 03:41:33 -0500 (CDT)
========================================================================
The Secunia Weekly Advisory Summary
2009-05-14 - 2009-05-21
This week: 79 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers
========================================================================
1) Word From Secunia:
"System access" vulnerabilities discovered in popular software in 2008
by:
Secunia: 44 Vulnerabilities discovered
iDefense Labs: 24 Vulnerabilities discovered
IBM/ISS: 15 Vulnerabilities discovered
Google Security: 13 Vulnerabilities discovered
NGS Software: 12 Vulnerabilities discovered
CoreSecurity: 12 Vulnerabilities discovered
Fortinet: 9 Vulnerabilities discovered
DVLabs: 8 Vulnerabilities discovered
CERT/CC: 6 Vulnerabilities discovered
McAfee Avert Labs: 5 Vulnerabilities discovered
Total research papers issued by Secunia Research in 2008: 64
http://secunia.com/secunia_research/
Are you sure you have all the necessary vulnerability intelligence
research you require to secure your systems?
Click here to learn more on how you can Stay Secure against newly
discovered vulnerabilities within your network:
http://secunia.com/advisories/business_solutions/
========================================================================
2) This Week in Brief:
A vulnerability has been discovered in Mac OS X, which can be exploited
by malicious people to compromise a user's system.
For more information, refer to:
http://secunia.com/advisories/35118/
--
Nikolaos Rangos has discovered a vulnerability in Microsoft Internet
Information Services (IIS), which can be exploited by malicious people
to bypass certain security restrictions.
For more information, refer to:
http://secunia.com/advisories/35109/
--
Tobias Klein has discovered a vulnerability in Winamp, which can be
exploited by malicious people to potentially compromise a user's
system.
For more information, refer to:
http://secunia.com/advisories/35126/
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA34012] Adobe Flash Player Multiple Vulnerabilities
2. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
3. [SA34924] Adobe Reader JavaScript Methods Memory Corruption
4. [SA32428] Microsoft PowerPoint Multiple Vulnerabilities
5. [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
6. [SA34866] Mozilla Firefox "nsTextFrame::ClearTextRun()" Memory
Corruption
7. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
8. [SA33954] Microsoft Excel Two Vulnerabilities
9. [SA35021] Pango Glyph String Parsing Integer Overflow Vulnerability
10. [SA35014] Google Chrome Skia 2D Integer Overflow Vulnerabilities
========================================================================
4) This Week in Numbers
During the past week 79 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.
This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:
Platforms:
Windows : 9 Secunia Advisories
Unix/Linux : 39 Secunia Advisories
Other : 2 Secunia Advisories
Cross platform : 29 Secunia Advisories
Criticality Ratings:
Extremely Critical : 0 Secunia Advisories
Highly Critical : 16 Secunia Advisories
Moderately Critical : 36 Secunia Advisories
Less Critical : 19 Secunia Advisories
Not Critical : 8 Secunia Advisories
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Subscribe:
http://secunia.com/advisories/weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support () secunia com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
--
Current thread:
- Secunia Weekly Summary - Issue: 2009-21 InfoSec News (May 26)
