Jump to content

SUBIECTE NOI
« 1 / 5 »
RSS
Info Coronavirus/Vaccinare vs Fake News

Stefan de la Barbulesti - pentru ...

Amazon Fire TV Cube (gen 2)

Charging station cu 20 usb
 P.M.B. (Primaria Capitalei) si ar...

Canon 75-300mm II USM - funcț...

Mai multe detalii despre roti din...

Zgomot puternic centrala Viessman...
 transfer continut video VHS pe PC

Refacere terasa la mansarda, din ...

Chenare albe la geamuri

Filme Dolby-Vision pe un Sony OLED
 Alimentare camere analogice la di...

cum pot conecta

Unde mai gasesti oamenii dupa adr...

PNI CT36 wireless
 

Breaking news 2007

- - - - -
  • This topic is locked This topic is locked
22 replies to this topic

#1
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Aici puteti posta informatii despre virusi noi, vulnerabilitati noi si pericole.
Breaking news din 2006 pot fi gasite aici: http://forum.softped...showtopic=50474

#2
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Stirile de azi

Firefox
Cross-site scripting hole in Firefox

Firefox: serious cookie stealing / same-domain bypass vulnerability

Versiuni afectate: toate

Solutii: folositi extensia NoScript, asteptati un update, folositi Opera


Microsoft

Extremely critical: vulnerabilitatea este exploatata activ

Microsoft Hit with Another Zero-Day Attack

New zero-day hole in Word

Produse afectate: Office 2000, Office XP, Word 2000, Word 2002

Solutie: scanati orice fisier inainte de a-l deschide

Edited by Daisuke, 16 February 2007 - 00:30.


#3
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Stirile de azi

Critical vulnerability in Google Desktop fixed

Analiza aici: Overtaking Google Desktop (PDF)


Firefox
Maine se asteapta un update la FF (2.0.0.2 / 1.5.10)
Vad ca se lucreaza intens. 2.0.0.2 a ajuns la rc5.

#4
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Firefox din nou

Firefox bookmark cross-domain travel vulnerability

Cel putin interesant. Atentie la ce apasati Ctrl-D  :coolspeak:  

Attached File  exploit.gif   11.5K   98 downloads

#5
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Update pentru Firefox

FF 2.0.0.2: http://www.mozilla.com/en-US/firefox/
FF 1.5.0.10: http://www.mozilla.c...s/1.5.0.10.html

1.5.0.x va mai primi update-uri de securitate si stabilitate pana pe 24.04.07

#6
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerabilitate in Publisher 2007

Severitate: Critical (remote code execution)

Alte detalii nu sunt cunoscute deocamdata: http://research.eeye...g/20070216.html



Vulnerabilitate in MSIE 7
(inca in cercetare)

NIST said:

This vulnerability is currently undergoing analysis and not all information is available.
Please check back soon to view the completed vulnerability summary.
http://nvd.nist.gov/...e=CVE-2007-1091

Severitate: less critical (spoofing)

Detalii (SANS): onunload()

Nota: Aceasta vulnerabilitate a fost eliminata in FF 2.0.0.2 / 1.5.0.10
Mozilla Firefox fails to properly handle Javascript onunload events

Edited by Daisuke, 26 February 2007 - 22:34.


#7
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Daca folositi Netscape

Vulnerabilitatile din FF se regasesc aici si bineinteles dureaza mai mult pana apare un patch.

Netscape Multiple Vulnerabilities

Severitate:  Highly critical (Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access, from remote)

Versiuni afectate: 8.1.2, probabil si altele mai vechi.

Solutie: asteptati un patch sau folositi FF 2.0.0.2

#8
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Security Update pentru Apple QuickTime

Apple QuickTime Multiple Vulnerabilities

Severitate:  Highly critical

Solutie: update now !

#9
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
HijackThis 2.0 Beta de la TrendMicro

Trend Micro Hijack This™

Anuntul de la merijn.org: http://www.merijn.org/

Quote

I sold HiJackThis because I had been sitting on an unfinished update for over a year and I still could not make enough time to finish it.

Quote

[v2.00.0]
* AnalyzeThis added for log file statistics
* Recognizes Windows Vista and IE7
* Fixed a few bugs in the O23 method
* Fixed a bug in the O22 method (SharedTaskScheduler)
* Did a few tweaks on the log format
* Fixed and improved ADS Spy
* Improved Itty Bitty Procman (processes are frozen before they are killed)
* Added listing of O4 Autoruns from other users
* Added listing of the Policies Run items in O4 method, used by SmitFraud trojan
* Added /silentautolog parameter for system admins
* Added /deleteonreboot [file] parameter for system admins
* Added O24 - ActiveX Desktop Components enumeration
* Added Enhanced Security Confirguration (ESC) Zones to O15 Trusted Sites check


#10
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Pentru fanii Nod32

Eset Smart Security
AV + fierwall + anti-spam

Incepand cu 2 aprilie poate fi downlodata versiunea beta.

#11
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Exploit public

Un exploit pentru vulnerabilitatea MS07-009 este public de ieri. Daca nu ati instalat patch-ul inca nu e tarziu sa o faceti.

#12
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling

Microsoft: Microsoft Security Advisory (935423)

Trendmicro: TROJ_ANICMOO.AX

McAfee: Unpatched Drive-By Exploit Found On The Web
McAfee (update): Unpatched Drive-By Exploit Found on the Web (Follow-Up)

Severitate: extremely critical (vulnerabilitatea este exploatata pe internet, inclusiv pe email)

Patch: inca nu exista

Sisteme afectate:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Vista

XP fara SP si SP1 nu sunt vulnerabile.
Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web.
Firefox 2.0 nu pare a fi vulnerabil.

Recomandari:
Actualizati semnaturile AV-ului (insa nu toti AV-ii detecteza inca exploiturile).
Scanati fisierele pe baza de continut (nu extensii)
Cititi emailurile doar in format text.

Home useri: nu stiu inca daca se pot bloca intr-un fel fisierele *.ani , folositi contul limitat in XP / Vista (nu administrator).

Edited by Daisuke, 29 March 2007 - 21:23.


#13
alexcrist

alexcrist

    Watchdog

  • Grup: Moderators
  • Posts: 8,892
  • Înscris: 02.02.2006

View PostDaisuke, on Mar 29 2007, 21:45, said:

Vulnerability in Windows Animated Cursor Handling

Microsoft: Microsoft Security Advisory (935423)

Trendmicro: TROJ_ANICMOO.AX

McAfee: Unpatched Drive-By Exploit Found On The Web
McAfee (update): Unpatched Drive-By Exploit Found on the Web (Follow-Up)

Severitate: extremely critical (vulnerabilitatea este exploatata pe internet, inclusiv pe email)

Patch: inca nu exista

Sisteme afectate:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Vista

XP fara SP si SP1 nu sunt vulnerabile.
Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web.
Firefox 2.0 nu pare a fi vulnerabil.

Recomandari:
Actualizati semnaturile AV-ului (insa nu toti AV-ii detecteza inca exploiturile).
Scanati fisierele pe baza de continut (nu extensii)
Cititi emailurile doar in format text.

Home useri: nu stiu inca daca se pot bloca intr-un fel fisierele *.ani , folositi contul limitat in XP / Vista (nu administrator).
Detalii si aici: BitDefender Forum

#14
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling - Update

Ce clienti de email sunt vulnerabili si cand ?
Ani cursor exploits against Microsoft E-mail clients

Outlook 2007 nu este vulnerabil.

Asa cum ne-am obisnuit a aparut un patch neoficial.
Patch neoficial: acesta nu este un patch Microsoft, il instalati pe propria raspundere
Windows .ANI Processing, la sfarsitul postului.

Daca instalati acest patch nu uitati sa-l dezinstalati cand apare patch-ul Microsoft.

[later]
Si un update de la McAfee:
ANI File Exploit Has Connection With Hacked Super Bowl Site
[/later]

Edited by Daisuke, 30 March 2007 - 20:14.


#15
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling - Update

Microsoft stia de acesta vulnerabilitate din 20 decembrie 2006. De atunci pana acum s-a chinuit sa inteleaga profund ce se intampla :))
Si ... surpriza. In timp de MS investiga vulnerabilitatea "baietzii dastepti" s-au gandit sa o exploateze.

Detalii aici: Update on Microsoft Security Advisory 935423

In timp ce MS se gandeste profund la pericole pe net SANS ISC trece la Threat Level: YELLOW.

Codul exploitului este public si oricine doreste se poate "juca" cu el.
Numarul site-urilor infectate este in crestere.

Have fun ! Nu deschideti emailuri de la necunoscuti si nu vizitati site-uri suspecte.

Edited by Daisuke, 31 March 2007 - 18:05.


#16
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling - Update

Sisteme vulnerabile - update:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems and Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Vista

Nu sunt vulnerabile - update:
XP fara SP si SP1 nu sunt vulnerabile.
Internet Explorer 7 in modul protejat din Vista nu este afectat de exploiturile din paginile web. Internet Explorer Protected Mode
Firefox 2.0 nu este vulnerabil.
Outlook 2007 nu este vulnerabil daca editorul de email este MSWord (default).

Recomandari - update:
Antivirus: Actualizati semnaturile AV-ului. Scanati fisierele pe baza de continut (nu extensii).

Outlook: Cititi emailurile doar in format text. Disable preview pane.

Note:
Outlook Express cu optiunea de citire a emailurilor in format text este vulnerabil;
Windows Vista Mail: Forward sau Reply la un email citit in format text permite executarea exploitului.

Windows Explorer:
Disable "Show common tasks in folders".

Browser + email: nu faceti click pe linkuri din email, mesaje instant (Yahoo, etc.), forum, IRC. Copy & paste linkul in browser. Asta insa nu garanteaza protectia.

Windows: folositi contul limitat (nu administrator).

SANS ISC: Threat Level - YELLOW.
Yellow inseamna:
Este investigata o noua amenintare.
Impactul este necunoscut sau e de asteptat sa fie minor pentru infrastructura.
Impactul local poate fi semnificativ.
Utilizatorii sunt sfatuiti sa ia masuri imediate pentru a diminua impactul.

Exemple cand s-a mai anuntat "Threat Level - YELLOW"
23 martie 2006 - createTextRange exploit
27 decembrie 2005 - vulnerabilitatea WMF
1 mai 2004 - viermele Sasser

#17
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling - Update

Patch-ul vine marti 3 aprilie.

Microsoft said:

On Tuesday 3 April 2007 Microsoft is planning to release:

Security Updates

One Microsoft Security Bulletin affecting Microsoft Windows.
The highest Maximum Severity rating for these is Critical. These updates will require a restart.


#18
Daisuke

Daisuke

    Moderator

  • Grup: Senior Members
  • Posts: 2,173
  • Înscris: 19.01.2004
Vulnerability in Windows Animated Cursor Handling - Patch !

Nu uitati sa dezinstalati patch-ul neoficial, daca l-ati instalat.

Patch-ul de la Microsoft: Microsoft Security Bulletin MS07-017

Daca aveti Realtek HD Audio Control Panel cititi cu atentie:
The Realtek HD Audio Control Panel may not start, and you receive an error message when you start the computer: "Illegal System DLL Relocation"

Edited by Daisuke, 03 April 2007 - 20:22.


Anunturi

Neurochirurgie minim invazivă Neurochirurgie minim invazivă

"Primum non nocere" este ideea ce a deschis drumul medicinei spre minim invaziv.

Avansul tehnologic extraordinar din ultimele decenii a permis dezvoltarea tuturor domeniilor medicinei. Microscopul operator, neuronavigația, tehnicile anestezice avansate permit intervenții chirurgicale tot mai precise, tot mai sigure. Neurochirurgia minim invazivă, sau prin "gaura cheii", oferă pacienților posibilitatea de a se opera cu riscuri minime, fie ele neurologice, infecțioase, medicale sau estetice.

www.neurohope.ro

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Forumul Softpedia foloseste "cookies" pentru a imbunatati experienta utilizatorilor Accept
Pentru detalii si optiuni legate de cookies si datele personale, consultati Politica de utilizare cookies si Politica de confidentialitate