Information Security News mailing list archives

Secunia Weekly Summary - Issue: 2011-42


From: InfoSec News <alerts () infosecnews org>
Date: Fri, 21 Oct 2011 02:25:22 -0500 (CDT)

========================================================================

                  The Secunia Weekly Advisory Summary
                        2011-10-13 - 2011-10-20

                       This week: 73 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4................................................Secunia Community News
5................................................Secunia Corporate News
6..................................................This Week in Numbers

========================================================================
1) Word From Secunia:

Secunia PSI: Country-specific statistics
"Regarding the number of programs and vendors found on the end-points
of various countries, end-users in Denmark have the least complex
portfolios, whereas Italian end-users have the most complex... The
highest patch level in the country portfolios is found in Australia
with 94.7%; and the lowest, 92.6%, is found in the Czech Republic - a
difference of 2.1%."
Read Secunia's Research Analyst Director's insights into the security
and composition of end-users' PCs: http://secunia.com/blog/265

========================================================================
2) This Week in Brief:

A vulnerability has been reported in Honeywell EBI Temaline, which can
be exploited by malicious people to compromise a user's system.
http://secunia.com/advisories/46497/

Multiple vulnerabilities have been reported in Novell ZENworks
Configuration Management, which can be exploited by malicious people to
compromise a user's system.
http://secunia.com/advisories/46466/

Multiple vulnerabilities have been reported in Oracle Java SE, which
can be exploited by malicious users to disclose certain information and
by malicious people to disclose potentially sensitive information,
hijack a user's session, conduct DNS cache poisoning attacks,
manipulate certain data, cause a DoS (Denial of Service), and
compromise a vulnerable system.
http://secunia.com/advisories/46512/

Jose A. Vazquez has discovered a vulnerability in Opera, which can be
exploited by malicious people to compromise a user's system.
http://secunia.com/advisories/46375/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

For more information on how to receive alerts on these vulnerabilities,
subscribe to the Secunia business solutions:
http://secunia.com/advisories/business_solutions/

1.  [SA46375] Opera Nested SVG Content Processing Code Execution
              Vulnerability
2.  [SA46512] Oracle Java SE Multiple Vulnerabilities
3.  [SA46397] VMware ESX / ESXi Server Multiple Vulnerabilities
4.  [SA46416] DAEMON Tools "\.\dtsoftbusctl" IOCTL Denial of
              Service Vulnerability
5.  [SA46377] Apple iOS Multiple Vulnerabilities
6.  [SA46412] Apple Safari Multiple Vulnerabilities
7.  [SA46113] Adobe Flash Player Multiple Vulnerabilities
8.  [SA46417] Apple Mac OS X Multiple Vulnerabilities
9.  [SA46438] Microsoft Office Publisher Document Insertion Buffer
              Overflow Vulnerability
10. [SA46339] Apple iTunes Multiple Vulnerabilities

========================================================================
4) Secunia Community News

Videos: Aberdeen Group & Secunia discuss the risks of mismanaging
vulnerabilities
Part 1: Investing only a minimal amount in vulnerability management
initiatives is like ignoring (and accepting) end-point security risk.
Part 2: Implementing the right patching strategy can significantly
reduce these risks: http://www.youtube.com/user/Secunia

Join Secunia @ Infosecurity Europe, 02-03 November, Utrecht, the
Netherlands
Book a one-to-one meeting with the Secunia team and learn how you can
enhance your patch management process:
http://secunia.com/resources/events/infosec_nl_2011/

========================================================================
5) Secunia Corporate News

Pre-emptive action against vulnerabilities - a priority for effective
security strategies
The Secunia VIM enables you to simplify and strategize your handling of
emerging threats. Read more and request a free trial:
http://secunia.com/products/corporate/vim/

========================================================================
6) This Week in Numbers

During the past week 73 Secunia Advisories have been released. All
Secunia customers have received immediate notification on the alerts
that affect their business.

This weeks Secunia Advisories had the following spread across platforms
and criticality ratings:

Platforms:
  Windows             :      5 Secunia Advisories
  Unix/Linux          :     28 Secunia Advisories
  Other               :      4 Secunia Advisories
  Cross platform      :     36 Secunia Advisories

Criticality Ratings:
  Extremely Critical  :      0 Secunia Advisories
  Highly Critical     :     11 Secunia Advisories
  Moderately Critical :     32 Secunia Advisories
  Less Critical       :     26 Secunia Advisories
  Not Critical        :      4 Secunia Advisories

========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web     : http://secunia.com/
E-mail  : support () secunia com
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45


_____________________________________________________
Subscribe to InfoSec News - www.infosecnews.org
http://www.infosecnews.org/mailman/listinfo/isn


Current thread: