Page 1 of 6 12345 ... LastLast
Results 1 to 10 of 56

Thread: Multiple AV vendor vulns / updates / issues

  1. #1
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Symantec AV multiple vulns - update available

    FYI...

    Symantec AV multiple vulns - update available
    - http://secunia.com/advisories/43099/
    Release Date: 2011-01-27
    Criticality level: Moderately critical
    Impact: DoS, System access
    Where: From local network
    Solution Status: Vendor Patch
    Software: Symantec AntiVirus Corporate Edition 10.x, System Center 10.x
    CVE Reference(s): CVE-2010-0110, CVE-2010-0111
    ... Intel AMS2 component when processing certain messages can be exploited to run arbitrary commands | cause a buffer overflow | create arbitrary events | cause a DoS ...
    Solution: Update to version 10.1 MR10.
    Original Advisory:
    - http://www.symantec.com/business/sec...id=20110126_00
    - http://www.symantec.com/business/sec...id=20110126_01

    - http://www.securitytracker.com/id/1024996
    Jan 27 2011
    - http://www.securitytracker.com/id/1024997
    Jan 28 2011

    Last edited by AplusWebMaster; 2011-01-28 at 11:38.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #2
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Clam AV vuln - update v0.97 available

    FYI...

    Clam AV vuln - update v0.97 available
    - http://secunia.com/advisories/43392/
    Release Date: 2011-02-21
    Criticality level: Moderately critical
    Impact: DoS, System access
    Where: From remote
    ... The vulnerability is reported in versions prior to 0.97.
    Solution: Update to version 0.97...
    - http://www.clamav.net/lang/en/download/sources/
    "... Latest stable release: ClamAV 0.97... Please read the upgrade instructions before upgrading..."
    * http://wiki.clamav.net/Main/UpgradeInstructions"

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1003
    Last revised: 02/24/2011

    - http://www.securitytracker.com/id/1025100
    Feb 21 2011

    Last edited by AplusWebMaster; 2011-02-28 at 21:25.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #3
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation CA multiple ActiveX vulns - update available ...

    FYI...

    CA ActiveX vuln - update available
    * http://secunia.com/advisories/43377/
    Release Date: 2011-02-24
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    Solution Status: Vendor Patch ...
    Original Advisory: ZDI / CA (CA20110223-01):
    http://www.zerodayinitiative.com/advisories/ZDI-11-093/

    CA ActiveX vuln - update available
    - http://secunia.com/advisories/43490/
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    Solution Status: Unpatched ...
    Solution: Set the kill-bit for the affected ActiveX control. Reportedly, the vendor will issue fix information soon.
    For more information: SA43377*

    - http://www.securitytracker.com/id/1025120
    Updated: Feb 26 2011
    ___

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1036
    Last revised: 03/11/2011
    CVSS v2 Base Score: 8.8 (HIGH)

    Last edited by AplusWebMaster; 2011-03-14 at 20:48.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #4
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post F-Secure multiple vulns - update available

    FYI...

    F-Secure multiple vulns - update available
    - http://secunia.com/advisories/43049/
    Release Date: 2011-02-24
    Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information
    Where: From remote...
    Software: F-Secure Policy Manager 8.x, F-Secure Policy Manager 9.x
    ... The weakness and the vulnerability are confirmed in version 9.00.30231 and also reported in versions 8.00 and 8.1x.
    Solution: Apply patches.
    Original Advisory: F-Secure (FSC-2011-2):
    http://www.f-secure.com/en_EMEA/supp...sc-2011-2.html

    - http://www.securitytracker.com/id/1025124
    Feb 24 2011
    ___

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1102
    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-1103
    Last revised: 03/11/2011
    "... before hotfix 2, 8.1x before hotfix 3 on Windows and hotfix 2 on Linux, and 9.00 before hotfix 4 on Windows and hotfix 2 on Linux..."

    Last edited by AplusWebMaster; 2011-03-14 at 20:48.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #5
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation McAfee Firewall Reporter vuln - fix...

    FYI...

    McAfee Firewall Reporter vuln - fix
    - https://kc.mcafee.com/corporate/inde...ent&id=SB10015
    Security Bulletins ID: SB10015
    Last Modified: April 11, 2011
    This update fixes a bug that leverages an issue in the authentication sequence to allow unauthorized users access to the system...
    > Remediation..."
    (See the URL above.)

    - http://www.securitytracker.com/id/1025314
    Apr 11 2011
    Version: prior to 5.1.0.13...

    - http://secunia.com/advisories/44110/
    Criticality level: Moderately critical
    ___

    - http://www.theregister.co.uk/2011/04...lter_screw_up/
    6 April 2011 - "McAfee has apologised for a Sesame Street-style mix-up over the weekend that temporarily prevented any customers with addresses that start with the letter A from receiving email. The glitch... bounced emails sent to supported inboxes that began with an A or a non-alphanumeric special character (eg, @$). In a statement, McAfee blamed a rogue script for the mix-up, which has now been resolved..."

    Last edited by AplusWebMaster; 2011-04-12 at 18:43.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #6
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Avast! false positive - virus defs 110411-1 ...

    FYI...

    Avast! false positive - virus defs 110411-1 ...
    - https://blog.avast.com/2011/04/11/fa...defs-110411-1/
    April 11 2011 - "Virus definition update 110411-1 contained an error that resulted in a good number of innocent sites being flagged as infected. Generally, all sites with a script in a specific format were affected... We sincerely apologize for the inconvenience..."

    - http://news.cnet.com/8301-1009_3-20053085-83.html
    April 12, 2011 - "... the update was downloaded by around 5 million users, mostly on the Western Hemisphere..."

    "Some of the sites affected by this Avast false positive include Wikipedia, Yahoo, PCWorld, and Youtube..."
    (Hat tip to cnm @ spywareinfoforum.com)*
    * http://www.spywareinfoforum.com/inde...ost__p__744891

    Last edited by AplusWebMaster; 2011-04-13 at 17:39.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #7
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation CA ActiveX controls vuln ...

    FYI...

    CA ActiveX controls vuln...
    - http://secunia.com/advisories/43681/
    Release Date: 2011-04-21
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    CVE Reference: CVE-2011-1719
    Solution: Apply APARs.
    Original Advisory: CA:
    https://support.ca.com/irj/portal/an...-B2AF457B5364}
    ___

    - http://www.securitytracker.com/id/1025423
    CVE Reference: CVE-2011-1718
    Apr 21 2011
    - http://www.securitytracker.com/id/1025424
    CVE Reference: CVE-2011-1719
    Apr 21 2011

    Last edited by AplusWebMaster; 2011-04-21 at 13:19.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #8
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Unhappy McAfee - False Positive in DAT 6329...

    FYI...

    McAfee - False Positive in DAT 6329...
    - http://isc.sans.edu/diary.html?storyid=10783
    Last Updated: 2011-04-28 12:26:24 UTC - McAfee Labs have issued an alert that McAfee VirusScan DAT file 6329 is returning a false positive for spsgui.exe. This is impacting SAP telephone connectivity functionality. McAfee... work around for the issue documented in KB71739:
    https://kc.mcafee.com/corporate/inde...ent&id=KB71739

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #9
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Avira AV v10 SP2 released

    FYI...

    Avira AV v10 SP2 released
    - http://techblog.avira.com/2011/06/28...ntivir-v10/en/
    June 28, 2011 - "... Service Pack 2 to all AntiVir v10 products today: Personal, Premium, Premium Security Suite, Professional and Server. Avira’s Service Pack 2 update will be made available as product update to all customers, paid and free in English and German. The other languages will follow in the next few weeks. Please make sure you have enabled Product Updates by choosing the first option in Configuration -> Update->Product Update...
    ... fixed many issues which our users reported
    ... improved the protection overall by enhancing the heuristic detection and the repair functionality
    ... enabled the protection of the product itself and that of the entire operating system by enabling automatically the advanced process protection which prevents malware to terminate the Avira processes and to change the registry keys of the system.
    ... antirootkits protection was enhanced in order to be able to detect new methods of hiding malware...
    You must restart your system after SP2 is installed in order to use the new drivers. Please save your work to prevent any loss of data.
    Please read here about how to prepare for the reboot if you are in a company: http://www.avira.com/en/support-for-...etail?kbid=841
    ... and check this document for the default values http://www.avira.com/files/support/F...P2_Prof_EN.pdf ...

    ... The SP2 brings also an optional toolbar to the users of the AntiVir Personal Free. If the user installs it, uses the toolbar and clicks on the links provided, Avira gets some money from the provider of the toolbar, the well-known search provider Ask .com... For more information about data collected, please read the Ask’s privacy policy available here:
    http://sp.ask.com/en/docs/about/privacy.shtml
    Most visible innovations in the SP2: http://www.avira.com/en/support-for-...tail/faqid/854
    Release Information of SP2 at a glance: http://www.avira.com/en/support-for-...tail/faqid/840.
    Detailed information of the changes performed in the products by the SP2:
    http://www.avira.com/files/support/F...V10_SP2_EN.pdf
    How to install the new Avira Toolbar after updating to SP2:
    http://www.avira.com/en/support-for-...tail/faqid/861
    How to install the new Avira Toolbar later via setup:
    http://www.avira.com/en/support-for-...tail/faqid/862
    How to -remove- the Avira Toolbar:
    http://www.avira.com/en/support-for-...tail?faqid=863

    Update: Some of our users experienced that the online protection is inactive after the SP2 update. Please see here* how to fix it.
    * http://www.avira.com/en/support-for-...etail/kbid/566
    ___

    - http://www.h-online.com/security/new...s-1271030.html
    30 June 2011

    Last edited by AplusWebMaster; 2011-07-03 at 11:20.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #10
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation CA Gateway v8.1 Security advisory...

    FYI...

    CA Gateway v8.1 Security advisory...
    - http://h-online.com/-1284003
    22 July 2011 - "CA is warning of a critical vulnerability in its Gateway Security 8.1 business security solution that allows attackers to inject malicious code into systems... The company has provided a fix* for Gateway Security. Alternatively, users can upgrade to version 9.0. Users of Total Defense Suite r12 are also advised to take action quickly as the vulnerable version of Gateway Security is part of this security package."

    * https://support.ca.com/irj/portal/an...642&actionID=4
    07/13/2011

    CA20110720-01: Security Notice for CA Gateway Security and Total Defense
    - https://support.ca.com/irj/portal/an...-027D05B6285D}
    July 20, 2011
    Risk Rating: High
    Platform: Windows
    Affected Products: CA Gateway Security 8.1, CA Total Defense r12
    Non-Affected Products: CA Gateway Security 9.0 ...
    ___

    - http://secunia.com/advisories/45332/
    Release Date: 2011-07-21
    Criticality level: Moderately critical
    ... vulnerability is reported in versions prior to 8.1.0.69...

    Last edited by AplusWebMaster; 2011-07-24 at 13:43.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •