[ISN] Secunia Weekly Summary - Issue: 2009-11

From: InfoSec News <alerts_at_private>
Date: Fri, 13 Mar 2009 02:28:29 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-03-05 - 2009-03-12                        

                       This week: 85 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Critical Vulnerability Fixed in Adobe Flash Player

Recently, Adobe released a patch, which fixes multiple vulnerabilities
for Adobe Flash Player.

Since Adobe Flash Player is used in enterprise environments and some of
the reported vulnerabilities may allow code execution, my Binary
Analysis team has spent some time analysing the patch in order to
properly understand the fixed vulnerabilities.

Read More:
http://secunia.com/blog/46/

 --

Monthly Binary Analysis Update (February)

February is (long) gone and it's therefore time to re-cap on our Binary
Analysis feats in the recent month.

This wasn't a terribly busy month, but 22 analyses were still issued
and two of the analysed vulnerabilities were particularly interesting.

Read More:
http://secunia.com/blog/47/

========================================================================
2) This Week in Brief:

Some vulnerabilities have been reported in Foxit Reader, which can be
exploited by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/34036/

 --

A vulnerability and a security issue have been reported in Apple
iTunes, which can be exploited by malicious people to cause a DoS
(Denial of Service) or to potentially disclose sensitive information.

For more information, refer to:
http://secunia.com/advisories/34254/

 --

Microsofts monthly security bulletins for March.

For more information, refer to:
http://secunia.com/advisories/34217/
http://secunia.com/advisories/34215/
http://secunia.com/advisories/34117/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA34012] Adobe Flash Player Multiple Vulnerabilities
2.  [SA33901] Adobe Reader/Acrobat JBIG2 Stream Array Indexing
              Vulnerability
3.  [SA33954] Microsoft Excel Invalid Object Reference Vulnerability
4.  [SA34135] Opera Multiple Vulnerabilities
5.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
6.  [SA32991] Sun Java JDK / JRE Multiple Vulnerabilities
7.  [SA34081] PHP Multiple Vulnerabilities
8.  [SA34096] Mozilla Firefox IDN Spoofing Security Issue
9.  [SA33981] Winamp libsndfile.dll CAF Processing Integer Overflow
              Vulnerability
10. [SA32270] Adobe Flash Player Multiple Security Issues and
              Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 85 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :     13 Secunia Advisories
  Unix/Linux          :     51 Secunia Advisories
  Other               :      0 Secunia Advisories
  Cross platform      :     21 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     11 Secunia Advisories
  Moderately Critical :     35 Secunia Advisories
  Less Critical       :     33 Secunia Advisories
  Not Critical        :      6 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/
Received on Fri Mar 13 2009 - 01:28:29 PDT

This archive was generated by hypermail 2.2.0 : Fri Mar 13 2009 - 01:34:34 PDT