======================================================================== The Secunia Weekly Advisory Summary 2009-04-30 - 2009-05-07 This week: 47 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Are you missing: * Vulnerabilities Summary Listing Example: [SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX Vulnerability * Vulnerabilities Content Listing Example: Windows: [SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-04-11 A vulnerability has been reported in Microsoft Data Access Components (MDAC), which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/19583/ This intelligence is part of the Secunia Vulnerability Intelligence Feed. Get: * Customised Intelligence. No more irrelevant alerts. * Access to Secunia Support. * Access to the Secunia vulnerability database. * Access to updated vulnerability intelligence that you are missing out on. Features also include: * XML Feed capability. * Multiple user accounts capability. * Ticketing System capability. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Google Chrome, which can potentially be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35014/ -- Secunia Research has discovered a vulnerability in Garmin Communicator Plug-In, which can be exploited by malicious people to bypass certain security restrictions. For more information, refer to: http://secunia.com/advisories/34326/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA34012] Adobe Flash Player Multiple Vulnerabilities 2. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 3. [SA34924] Adobe Reader JavaScript Methods Memory Corruption 4. [SA34866] Mozilla Firefox "nsTextFrame::ClearTextRun()" Memory Corruption 5. [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities 6. [SA33954] Microsoft Excel Two Vulnerabilities 7. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 8. [SA32604] IBM Tivoli Storage Manager Multiple Vulnerabilities 9. [SA23655] Microsoft XML Core Services Multiple Vulnerabilities 10. [SA34977] Linux Kernel "ptrace_attach()" Privilege Escalation Vulnerability ======================================================================== 4) This Week in Numbers During the past week 47 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 4 Secunia Advisories Unix/Linux : 27 Secunia Advisories Other : 0 Secunia Advisories Cross platform : 16 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 7 Secunia Advisories Moderately Critical : 20 Secunia Advisories Less Critical : 12 Secunia Advisories Not Critical : 8 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 -- LayerOne 2009, Information Security for the discerning professional. May 23-24 2009 @ The Anaheim Marriott in Anaheim, California Visit http://layerone.info for more informationReceived on Fri May 08 2009 - 02:01:02 PDT
This archive was generated by hypermail 2.2.0 : Fri May 08 2009 - 02:07:42 PDT