infosec-news February 2011 archive
Main Archive Page > Month Archives  > infosec-news archives
infosec-news: [ISN] Secunia Weekly Summary - Issue: 2011-07

[ISN] Secunia Weekly Summary - Issue: 2011-07

From: InfoSec News <alerts_at_nospam>
Date: Fri Feb 18 2011 - 09:30:58 GMT
To: isn@infosecnews.org

========================================================================

                  The Secunia Weekly Advisory Summary
                        2011-02-10 - 2011-02-17

                       This week: 66 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Make a date with Secunia @ the RSA Conference 2011, USA Register now to
get a free expo pass to the exhibit hall:
http://secunia.com/company/events/rsa_2011/

========================================================================
2) This Week in Brief:

Windows Applications Insecure Library Loading

The Official, Verified Secunia List:
http://secunia.com/advisories/windows_insecure_library_loading/

The list is continuously updated as we confirm the vulnerability
reports so check back regularly too see if any of your apps are
affected.

 --

Multiple vulnerabilities have been reported in Sun Java, which can be
exploited by malicious, local users to disclose potentially sensitive
information and by malicious people to disclose potentially sensitive
information, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.

Read more:
http://secunia.com/advisories/43262/

 --

Cupidon-3005 has discovered a vulnerability in Microsoft Windows, which
can be exploited by malicious people to cause a DoS (Denial of Service)
or potentially compromise a vulnerable system.

Read more:
http://secunia.com/advisories/43299/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1. [SA43267] Adobe Flash Player Multiple Vulnerabilities
2. [SA43193] Google Chrome Multiple Vulnerabilities
3. [SA43262] Sun Java JDK / JRE / SDK "doubleValue()" Denial of
              Service Vulnerability
4. [SA42779] Microsoft Windows Thumbnail Bitmap Parsing Buffer
              Overflow
5. [SA42510] Internet Explorer Multiple Vulnerabilities
6. [SA43093] Microsoft Windows MHTML Cross-Site Scripting
              Vulnerability
7. [SA43207] Adobe Reader / Acrobat Multiple Vulnerabilities
8. [SA41917] Adobe Flash Player Multiple Vulnerabilities
9. [SA43131] VLC Media Player MKV Demuxer "MKV_IS_ID"
              Vulnerability
10. [SA43198] Apache Tomcat Multiple Vulnerabilities

========================================================================
4) This Week in Numbers

During the past week 66 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows : 15 Secunia Advisories
  Unix/Linux : 27 Secunia Advisories
  Other : 1 Secunia Advisory
  Cross platform : 23 Secunia Advisories

Criticality Ratings:
  Extremely Critical : 0 Secunia Advisories
  Highly Critical : 7 Secunia Advisories
  Moderately Critical : 29 Secunia Advisories
  Less Critical : 28 Secunia Advisories
  Not Critical : 2 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web : http://secunia.com/
E-mail : support@secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45

___________________________________________________________
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery
Network, Cisco Switches, SAS 70 Type II Datacenter.
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/