Symantec AV multiple vulns - update available
FYI...
Symantec AV multiple vulns - update available
- http://secunia.com/advisories/43099/
Release Date: 2011-01-27
Criticality level: Moderately critical
Impact: DoS, System access
Where: From local network
Solution Status: Vendor Patch
Software: Symantec AntiVirus Corporate Edition 10.x, System Center 10.x
CVE Reference(s): CVE-2010-0110, CVE-2010-0111
... Intel AMS2 component when processing certain messages can be exploited to run arbitrary commands | cause a buffer overflow | create arbitrary events | cause a DoS ...
Solution: Update to version 10.1 MR10.
Original Advisory:
- http://www.symantec.com/business/sec...id=20110126_00
- http://www.symantec.com/business/sec...id=20110126_01
- http://www.securitytracker.com/id/1024996
Jan 27 2011
- http://www.securitytracker.com/id/1024997
Jan 28 2011
:fear:
Clam AV vuln - update v0.97 available
FYI...
Clam AV vuln - update v0.97 available
- http://secunia.com/advisories/43392/
Release Date: 2011-02-21
Criticality level: Moderately critical
Impact: DoS, System access
Where: From remote
... The vulnerability is reported in versions prior to 0.97.
Solution: Update to version 0.97...
- http://www.clamav.net/lang/en/download/sources/
"... Latest stable release: ClamAV 0.97... Please read the upgrade instructions before upgrading..."
* http://wiki.clamav.net/Main/UpgradeInstructions"
- http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1003
Last revised: 02/24/2011
- http://www.securitytracker.com/id/1025100
Feb 21 2011
:fear:
CA multiple ActiveX vulns - update available ...
FYI...
CA ActiveX vuln - update available
* http://secunia.com/advisories/43377/
Release Date: 2011-02-24
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch ...
Original Advisory: ZDI / CA (CA20110223-01):
http://www.zerodayinitiative.com/advisories/ZDI-11-093/
CA ActiveX vuln - update available
- http://secunia.com/advisories/43490/
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Unpatched ...
Solution: Set the kill-bit for the affected ActiveX control. Reportedly, the vendor will issue fix information soon.
For more information: SA43377*
- http://www.securitytracker.com/id/1025120
Updated: Feb 26 2011
___
- http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1036
Last revised: 03/11/2011
CVSS v2 Base Score: 8.8 (HIGH)
:fear:
F-Secure multiple vulns - update available
FYI...
F-Secure multiple vulns - update available
- http://secunia.com/advisories/43049/
Release Date: 2011-02-24
Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information
Where: From remote...
Software: F-Secure Policy Manager 8.x, F-Secure Policy Manager 9.x
... The weakness and the vulnerability are confirmed in version 9.00.30231 and also reported in versions 8.00 and 8.1x.
Solution: Apply patches.
Original Advisory: F-Secure (FSC-2011-2):
http://www.f-secure.com/en_EMEA/supp...sc-2011-2.html
- http://www.securitytracker.com/id/1025124
Feb 24 2011
___
- http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1102
- http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1103
Last revised: 03/11/2011
"... before hotfix 2, 8.1x before hotfix 3 on Windows and hotfix 2 on Linux, and 9.00 before hotfix 4 on Windows and hotfix 2 on Linux..."
:fear:
McAfee Firewall Reporter vuln - fix...
FYI...
McAfee Firewall Reporter vuln - fix
- https://kc.mcafee.com/corporate/inde...ent&id=SB10015
Security Bulletins ID: SB10015
Last Modified: April 11, 2011
This update fixes a bug that leverages an issue in the authentication sequence to allow unauthorized users access to the system...
> Remediation..."
(See the URL above.)
- http://www.securitytracker.com/id/1025314
Apr 11 2011
Version: prior to 5.1.0.13...
- http://secunia.com/advisories/44110/
Criticality level: Moderately critical
___
- http://www.theregister.co.uk/2011/04...lter_screw_up/
6 April 2011 - "McAfee has apologised for a Sesame Street-style mix-up over the weekend that temporarily prevented any customers with addresses that start with the letter A from receiving email. The glitch... bounced emails sent to supported inboxes that began with an A or a non-alphanumeric special character (eg, @£$). In a statement, McAfee blamed a rogue script for the mix-up, which has now been resolved..."
:sad:
Avast! false positive - virus defs 110411-1 ...
FYI...
Avast! false positive - virus defs 110411-1 ...
- https://blog.avast.com/2011/04/11/fa...defs-110411-1/
April 11 2011 - "Virus definition update 110411-1 contained an error that resulted in a good number of innocent sites being flagged as infected. Generally, all sites with a script in a specific format were affected... We sincerely apologize for the inconvenience..."
- http://news.cnet.com/8301-1009_3-20053085-83.html
April 12, 2011 - "... the update was downloaded by around 5 million users, mostly on the Western Hemisphere..."
"Some of the sites affected by this Avast false positive include Wikipedia, Yahoo, PCWorld, and Youtube..."
(Hat tip to cnm @ spywareinfoforum.com)*
* http://www.spywareinfoforum.com/inde...ost__p__744891
:fear:
CA ActiveX controls vuln ...
FYI...
CA ActiveX controls vuln...
- http://secunia.com/advisories/43681/
Release Date: 2011-04-21
Criticality level: Highly critical
Impact: System access
Where: From remote
CVE Reference: CVE-2011-1719
Solution: Apply APARs.
Original Advisory: CA:
https://support.ca.com/irj/portal/an...-B2AF457B5364}
___
- http://www.securitytracker.com/id/1025423
CVE Reference: CVE-2011-1718
Apr 21 2011
- http://www.securitytracker.com/id/1025424
CVE Reference: CVE-2011-1719
Apr 21 2011
:fear::fear:
McAfee - False Positive in DAT 6329...
FYI...
McAfee - False Positive in DAT 6329...
- http://isc.sans.edu/diary.html?storyid=10783
Last Updated: 2011-04-28 12:26:24 UTC - McAfee Labs have issued an alert that McAfee VirusScan DAT file 6329 is returning a false positive for spsgui.exe. This is impacting SAP telephone connectivity functionality. McAfee... work around for the issue documented in KB71739:
https://kc.mcafee.com/corporate/inde...ent&id=KB71739
:sad:
Avira AV v10 SP2 released
FYI...
Avira AV v10 SP2 released
- http://techblog.avira.com/2011/06/28...ntivir-v10/en/
June 28, 2011 - "... Service Pack 2 to all AntiVir v10 products today: Personal, Premium, Premium Security Suite, Professional and Server. Avira’s Service Pack 2 update will be made available as product update to all customers, paid and free in English and German. The other languages will follow in the next few weeks. Please make sure you have enabled Product Updates by choosing the first option in Configuration -> Update->Product Update...
... fixed many issues which our users reported
... improved the protection overall by enhancing the heuristic detection and the repair functionality
... enabled the protection of the product itself and that of the entire operating system by enabling automatically the advanced process protection which prevents malware to terminate the Avira processes and to change the registry keys of the system.
... antirootkits protection was enhanced in order to be able to detect new methods of hiding malware...
You must restart your system after SP2 is installed in order to use the new drivers. Please save your work to prevent any loss of data.
Please read here about how to prepare for the reboot if you are in a company: http://www.avira.com/en/support-for-...etail?kbid=841
... and check this document for the default values http://www.avira.com/files/support/F...P2_Prof_EN.pdf ...
... The SP2 brings also an optional toolbar to the users of the AntiVir Personal Free. If the user installs it, uses the toolbar and clicks on the links provided, Avira gets some money from the provider of the toolbar, the well-known search provider Ask .com... For more information about data collected, please read the Ask’s privacy policy available here:
http://sp.ask.com/en/docs/about/privacy.shtml
Most visible innovations in the SP2: http://www.avira.com/en/support-for-...tail/faqid/854
Release Information of SP2 at a glance: http://www.avira.com/en/support-for-...tail/faqid/840.
Detailed information of the changes performed in the products by the SP2:
http://www.avira.com/files/support/F...V10_SP2_EN.pdf
How to install the new Avira Toolbar after updating to SP2:
http://www.avira.com/en/support-for-...tail/faqid/861
How to install the new Avira Toolbar later via setup:
http://www.avira.com/en/support-for-...tail/faqid/862
How to -remove- the Avira Toolbar:
http://www.avira.com/en/support-for-...tail?faqid=863
Update: Some of our users experienced that the online protection is inactive after the SP2 update. Please see here* how to fix it.
* http://www.avira.com/en/support-for-...etail/kbid/566
___
- http://www.h-online.com/security/new...s-1271030.html
30 June 2011
:fear:
CA Gateway v8.1 Security advisory...
FYI...
CA Gateway v8.1 Security advisory...
- http://h-online.com/-1284003
22 July 2011 - "CA is warning of a critical vulnerability in its Gateway Security 8.1 business security solution that allows attackers to inject malicious code into systems... The company has provided a fix* for Gateway Security. Alternatively, users can upgrade to version 9.0. Users of Total Defense Suite r12 are also advised to take action quickly as the vulnerable version of Gateway Security is part of this security package."
* https://support.ca.com/irj/portal/an...642&actionID=4
07/13/2011
CA20110720-01: Security Notice for CA Gateway Security and Total Defense
- https://support.ca.com/irj/portal/an...-027D05B6285D}
July 20, 2011
Risk Rating: High
Platform: Windows
Affected Products: CA Gateway Security 8.1, CA Total Defense r12
Non-Affected Products: CA Gateway Security 9.0 ...
___
- http://secunia.com/advisories/45332/
Release Date: 2011-07-21
Criticality level: Moderately critical
... vulnerability is reported in versions prior to 8.1.0.69...
:fear: