[ISN] Secunia Weekly Summary - Issue: 2009-19

From: InfoSec News <alerts_at_private>
Date: Fri, 8 May 2009 04:01:02 -0500 (CDT)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2009-04-30 - 2009-05-07                        

                       This week: 47 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Are you missing:

* Vulnerabilities Summary Listing

Example:

[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability


* Vulnerabilities Content Listing

Example:

Windows:

[SA19583] Microsoft Data Access Components RDS.Dataspace ActiveX
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-04-11

A vulnerability has been reported in Microsoft Data Access Components
(MDAC), which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/19583/


This intelligence is part of the Secunia Vulnerability Intelligence
Feed.

Get:
* Customised Intelligence. No more irrelevant alerts.
* Access to Secunia Support.
* Access to the Secunia vulnerability database.
* Access to updated vulnerability intelligence that you are missing out
on.

Features also include:
* XML Feed capability.
* Multiple user accounts capability.
* Ticketing System capability.

Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/

Click here to trial our solutions:
http://secunia.com/advisories/try_vi/

========================================================================
2) This Week in Brief:

Some vulnerabilities have been reported in Google Chrome, which can
potentially be exploited by malicious people to compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/35014/

 --

Secunia Research has discovered a vulnerability in Garmin Communicator
Plug-In, which can be exploited by malicious people to bypass certain
security restrictions.

For more information, refer to:
http://secunia.com/advisories/34326/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA34012] Adobe Flash Player Multiple Vulnerabilities
2.  [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities
3.  [SA34924] Adobe Reader JavaScript Methods Memory Corruption
4.  [SA34866] Mozilla Firefox "nsTextFrame::ClearTextRun()" Memory
              Corruption
5.  [SA33901] Adobe Reader/Acrobat Multiple Vulnerabilities
6.  [SA33954] Microsoft Excel Two Vulnerabilities
7.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
8.  [SA32604] IBM Tivoli Storage Manager Multiple Vulnerabilities
9.  [SA23655] Microsoft XML Core Services Multiple Vulnerabilities
10. [SA34977] Linux Kernel "ptrace_attach()" Privilege Escalation
              Vulnerability

========================================================================
4) This Week in Numbers

During the past week 47 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      4 Secunia Advisories
  Unix/Linux          :     27 Secunia Advisories
  Other               :      0 Secunia Advisories
  Cross platform      :     16 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :      7 Secunia Advisories
  Moderately Critical :     20 Secunia Advisories
  Less Critical       :     12 Secunia Advisories
  Not Critical        :      8 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


--
LayerOne 2009, Information Security for the discerning professional. 
May 23-24 2009 @ The Anaheim Marriott in Anaheim, California 
Visit http://layerone.info for more information
Received on Fri May 08 2009 - 02:01:02 PDT

This archive was generated by hypermail 2.2.0 : Fri May 08 2009 - 02:07:42 PDT