Severity Rating: Important
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker runs a specially crafted application on an affected system or convinces a user to visit a website that contains specially crafted PNG images.
Monthly Archives: March 2015
MS15-027 – Important: Vulnerability in NETLOGON Could Allow Spoofing (3002657) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic.
MS15-019 – Critical: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3040297) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
MS15-021 – Critical: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution (3032323) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS15-018 – Critical: Cumulative Security Update for Internet Explorer (3032359) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Re: Java 8u40 released: why?
Posted by Dave Warren on Mar 10
Unfortunately for Apple and for Mac users in general, Mac users are
going to have to learn that the main security issue on Windows exists in
OSX too: The user. The only real thing that has kept OSX safe from
user-installed malware until now is the relative obscurity of OSX; as
OSX gains enough market share to be worth malware author’s time, we’ll
see more and more malware, ranging from bundleware that replaces user
preference with…
Re: Java 8u40 released: why?
Posted by James Hodgkinson on Mar 10
Nick,
Nowhere in the quoted text or my comments did it say it was a forced option, only that it “appeared” in the update;
this thread started with questions as to whether there was any actual changes with the version bump, and I was offering
a possibility.
James
James Hodgkinson wrote:
Indeed!
So you did not notice the explanation that this would happen, right
there on the “continue the install” permission dialog?…
Varnish 4.0.3 heap-buffer-overflow while parsing backend server HTTP response.
Posted by Marek Kroemeke on Mar 10
Hi there,
Latest varnish-cache 4.0.3 (https://www.varnish-cache.org/) seem to have a problem with parsing HTTP responses from
backend.
The following example response will trigger a heap buffer overflow :
— cut —
perl -e ‘print “HTTP/1.1 200 OKrnContent-Length: dupa” . “n” x 15855 . “A” x 10000 . “n” ‘ | nc -l 1098
— cut —
assuming your config uses localhost:1098 as backend.
meh…
[CVE Identifier Updated] OpenKM Platform Remote Reflected Cross Site Scripting
Posted by Mohamed A. Baset on Mar 10
# Exploit Title: OpenKM Platform Remote Reflected Cross Site Scripting
# Google Dork: N/A
# Date: 18-11-2014
# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)
# Vendor Homepage: http://www.openkm.com/en
<http://s.bl-1.com/h/mQ2bNXq?url=http://www.openkm.com/en>/
# Software Link: http://www.openkm.com/en/download-english.html
<http://s.bl-1.com/h/mQ2bTws?url=http://www.openkm.com/en/download-english.html>
# Version: All…
Digital Whisper Electronic Magazine #59
Digital Whisper Electronic Magazine issue 59. Written in Hebrew.