Severity Rating: Critical
Revision Note: V1.0 (May 13, 2014): Bulletin published.
Summary: This security update resolves multiple privately reported vulnerabilities in Microsoft Office server and productivity software. The most severe of these vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a target SharePoint server.
All posts by 007admin
MS14-025 – Important: Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 13, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker uses certain Active Directory Group Policy preferences extensions to configure, distribute and ultimately decrypt the passwords that are stored with Group Policy preferences.
Panda Security launches Panda Cloud Antivirus 3.0, more intuitive, lighter and safer than ever before
Panda Security, The Cloud Security Company, today announced the launch of a new version of its popular cloud-based free antivirus scanner Panda Cloud Antivirus, v3.0. The launch follows the successful release last February of the product’s 2.9 beta, which has already been downloaded more than 30,000 times by users from more than 130 countries.
Panda Cloud Antivirus 3.0 has, in both its free and Pro Edition versions, a completely new look and feel, much more modern and intuitive than ever before. Additionally, the solution provides significantly improved protection against new threats and exploits that take advantage of system vulnerabilities, as well as automatic USB vaccination, a feature which was previously restricted to Pro users only and is now available to all users.
Also, the solution includes a Rescue Kit extremely useful in emergency situations caused by malware infections, and a more powerful process monitor.
New Features
The new Panda Cloud Antivirus provides the ability to run scheduled scans, a feature strongly demanded by the Panda Security community, and a new Panda Account, a personal area where users can download products, manage their services, obtain documentation, access technical support through a new support forum, and manage their Android devices provided they are protected with Panda Mobile Security.
In addition, users of the Pro version will be able to enjoy VIP support via a Web form and the technical support forum. The Pro version comes with a new Wi-Fi monitor module which enables users to display a list of all devices that are currently connected to their network and find out if there is someone stealing their Wi-Fi.
All these improvements make the new Panda Cloud Antivirus 3.0 lighter and more complete than ever. âWe are constantly evolving our detection technologies to protect our customers against new and emerging threats while minimizing false positives. And our efforts are paying off, as shown by the excellent results obtained by Panda Cloud Antivirus in the latest AV-Test evaluation, where it ranked as the best free antivirus solutionâ, said Alberto Añón, Panda Cloud Antivirus Product Manager at Panda Security.
Top Ratings by AV-Test
The latest evaluation and certification report published by the prestigious IT security institute AV-Test rates Panda Cloud Antivirus as the best free antivirus solution. The product obtained top ratings in the protection (6/6) and ease of use (6/6) areas, without a single false positive.
Click here for more information about Panda Cloud Antivirus
![]()
CVE-2014-3214 (bind)
The prefetch implementation in named in ISC BIND 9.10.0, when a recursive nameserver is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a DNS query that triggers a response with unspecified attributes.
CVE-2014-0189 (enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_workstation, virt-who)
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
MS14-021 – Critical: Security Update for Internet Explorer (2965111) – Version: 1.1
Severity Rating: Critical
Revision Note: V1.1 (May 1, 2014): Bulletin revised to specify that the latest cumulative security update for Internet Explorer must be installed prior to installing MS14-021. See the Update FAQ for details.
Summary: This security update resolves a publicly disclosed vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using an affected version of Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Microsoft Internet Explorer Use After Free Vulnerability
A memory corruption vulnerability exists in Microsoft Internet Explorer 6, 7, 8, 9, 10 and 11 and can lead to remote code execution. Exploitation of this vulnerability has been observed in targeted attacks, such as “Operation Clandestine Fox.”
CVE-2014-1776 (internet_explorer)
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that “VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks.”
CVE-2014-1765 (internet_explorer)
Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
CVE-2014-3007
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. (CVSS:10.0) (Last Update:2014-04-28)