Weekly Infosec News Brief 11-17 May

Microsoft Issues Thirteen Security Bulletins, Three of Them Critical

Last Tuesday was "Patch Tuesday" for the month of May, and Microsoft had a significant number of patches for their products. Three of the patches were rated as "critical," including one for Internet Explorer, one for Windows font drivers that affects both Windows and Office products, and one for the Windows Journal. Even though there are only three critical patches, each patches multiple vulnerabilities (there are over 30 vulnerabilities fixed by these three patches). The MS15-044 bulletin for the font drivers is probably the most critical, as it may allow for remote code execution when any user simply visits a web page or opens a document with a font that exploits the flaw.
https://technet.microsoft.com/en-us/library/security/MS15-MAY
https://technet.microsoft.com/library/security/MS15-044
http://www.symantec.com/connect/blogs/microsoft-patch-tuesday-may-2015


Adobe Announces Critical Security Updates for Flash, Reader, Acrobat, and AIR

On Tuesday Adobe released updates for their Flash and Reader/Acrobat products to fix critical (Adobe's level "1" rating) vulnerabilities." Google Chrome updates its Flash version automatically, as does Internet Explorer on Windows 8.x. The new version of Flash for Mac and Windows is 17.0.0.188. You can check the version of Flash you are running by visiting the following link: https://www.adobe.com/software/flash/about/ Adobe AIR is also affected by the same vulnerability as was announced for Acrobat/Reader, but for AIR it is rated as less risky. Flash and Reader have been two of the most frequently-exploited programs over the past several years, so it is advisable to patch them as quickly as possible.
Flash Bulletin: https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
Reader/Acrobat Bulletin: https://helpx.adobe.com/security/products/reader/apsb15-10.html


"VENOM" Vulnerability Puts Some Virtualization Platforms at Risk

A vulnerability announced last week represents a serious potential risk to many virtualized server environments. Vulnerable products may allow an attacker who gains access to a single virtual machine running on a server to "escape" from the guest machine and gain control of the virtual host server (and thereby possibly all of the other guest machines). The "VENOM" vulnerability is a programming flaw in the QEMU (Quick Emulator) open source project, which forms much of the core of the Xen, VirtualBox, and KVM virtualization platforms. Microsoft Hyper-V and VMWare do not utilize the QEMU code, and are not affected. The flaw is in the code which handles virtualized floppy drives, but is present regardless of whether a virtual floppy drive is equipped or not. Patches for the vulnerability are available from the affected vendors.
https://nakedsecurity.sophos.com/2015/05/14/the-venom-virtual-machine-escape-bug-what-you-need-to-know/


Firefox 38 Released; Fixes 13 Security Issues, Five of Them Critical

Mozilla released Firefox 38 last Tuesday, and updating to the new version should be a priority for any organization running Firefox. The new version fixes five critical security vulnerabilities, including buffer overflows in the code for rendering XML files and SVG graphics.
http://www.eweek.com/security/mozilla-firefox-38-gets-a-bakers-dozen-security-updates.html


MacKeeper Security Software for Macs Created A Critical Security Hole

MacKeeper is a controversial security program for Macs, and is well known to most Mac users for their aggressive popup advertising. Last Monday the company announced that a serious flaw was present in the software that made it possible for an attacker to issue arbitrary command with root privileges if a user visited a malicious website using the Safari web browser. A new version is available which fixes the problem.
http://www.computerworld.com/article/2921115/malware-vulnerabilities/mackeeper-security-program-opens-critical-hole-on-macs.html

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February