======================================================================== The Secunia Weekly Advisory Summary 2009-06-18 - 2009-06-25 This week: 50 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers ======================================================================== 1) Word From Secunia: Meet us at the annual FIRST conference in Kyoto, Japan Secunia will be attending the FIRST conference in Kyoto from the 28th of June 2009 to the 3rd of July 2009. Come and meet one of our representatives including the CTO of Secunia. The Forum of Incident Response and Security Teams (FIRST) is a global non-profit organisation dedicated to bringing together computer security incident response teams (CSIRT's) and includes response teams from 194 corporations, government bodies, universities and other institutions spread across the Americas, Asia, Europe and Oceania. FIRST is the global Forum for Incident Response and Security Teams: http://www.first.org/ Book a meeting with a Secunia representative at the FIRST conference! Please send an email to: sales_at_private New Blog: The Dirty Dozen You Probably Got A Dirty Dozen. And it only takes one "dirty" program to compromise your PC - but the bad guys got a dozen shots on average! It is a disturbing fact that the average PC users, not using the Secunia PSI, has a total of 12 unpatched and thus insecure programs on their PC, as we described in our blog yesterday. Read More: http://secunia.com/blog/56/ ======================================================================== 2) This Week in Brief: A vulnerability has been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35548/ -- Two vulnerabilities have been reported in Samba, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to potentially compromise a user's system. For more information, refer to: http://secunia.com/advisories/35539/ -- A vulnerability has been reported in Shockwave Player, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/35544/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability 2. [SA35331] Mozilla Firefox Multiple Vulnerabilities 3. [SA34580] Adobe Reader/Acrobat Multiple Vulnerabilities 4. [SA34012] Adobe Flash Player Multiple Vulnerabilities 5. [SA35449] Apple iPhone / iPod touch Multiple Vulnerabilities 6. [SA34451] Sun Java JDK / JRE Multiple Vulnerabilities 7. [SA35359] IrfanView 1BPP Image Resampling Integer Overflow Vulnerability 8. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 9. [SA35548] Google Chrome HTTP Response Buffer Overflow Vulnerability 10. [SA35544] Shockwave Player Arbitrary Code Execution Vulnerability ======================================================================== 4) This Week in Numbers During the past week 50 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business. This weeks Secunia Advisories had the following spread across platforms and criticality ratings: Platforms: Windows : 4 Secunia Advisories Unix/Linux : 24 Secunia Advisories Other : 2 Secunia Advisories Cross platform : 20 Secunia Advisories Criticality Ratings: Extremely Critical : 0 Secunia Advisories Highly Critical : 9 Secunia Advisories Moderately Critical : 21 Secunia Advisories Less Critical : 18 Secunia Advisories Not Critical : 2 Secunia Advisories ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _____________________________________________ Visit the InfoSec News security bookstore! http://www.shopinfosecnews.orgReceived on Fri Jun 26 2009 - 02:42:12 PDT
This archive was generated by hypermail 2.2.0 : Fri Jun 26 2009 - 02:50:07 PDT