Blogs

Vulnerability in Internet Explorer Could Allow Information Disclosure

http://www.microsoft.com/technet/security/advisory/980088.mspx

Thanks to Chris for the tip.

Microsoft is reporting a new vulnerability in IE that could lead to
information disclosure of files with known filenames to a remote attacker.

"[If] a user is using a version of Internet Explorer that is not running
in Protected Mode an attacker may be able to access files with an
already known filename and location."

Vulnerability in Internet Explorer Could Allow Information Disclosure

http://www.microsoft.com/technet/security/advisory/980088.mspx

Thanks to Chris for the tip.

Microsoft is reporting a new vulnerability in IE that could lead to
information disclosure of files with known filenames to a remote attacker.

"[If] a user is using a version of Internet Explorer that is not running
in Protected Mode an attacker may be able to access files with an
already known filename and location."

lighttpd Slow Request Handling Remote Denial Of Service Vulnerability

http://www.securityfocus.com/bid/38036/info

Exploits have been released for this issue. Slow input of the URL
request could lead to DoS from a remote host.

Patches have been released. It is recommended that lighttpd users
upgrade to the latest available code.

Thanks,
Brian

lighttpd Slow Request Handling Remote Denial Of Service Vulnerability

http://www.securityfocus.com/bid/38036/info

Exploits have been released for this issue. Slow input of the URL
request could lead to DoS from a remote host.

Patches have been released. It is recommended that lighttpd users
upgrade to the latest available code.

Thanks,
Brian

What should I do about illegal activity in an email?

Sometimes you might receive a fraudulent email asking you for personal information that could be used for illegal activities.  A lot of people just delete the email and move on.  But, what if you want to notify someone?  What if the scam is very convincing and you want someone to look into it?

Here are some tips on what to do in this situation.

APPLE-SA-2010-02-02-1 iPhone OS arbitrary code execution and passcode bypass

http://support.apple.com/kb/HT1222

An email from apple describes an update for the iPhone and iPod Touch
that covers arbitrary code execution and passcode bypass vulnerabilities.

"iPhone OS 3.1.3 and iPhone OS 3.1.3 for iPod touch is now available
and addresses the following:

GNU Gzip Dynamic Huffman Decompression Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/37888/info

A vulnerability in Gzip could lead to remote code execution. This is
especially critical for services that automatically gunzip files as part
of vulnerability scanning.

Multiple OS versions are affected.

It is recommended that the latest available version of gzip be applied
to systems which use Gzip.

Thanks,
Brian

GNU Gzip Dynamic Huffman Decompression Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/37888/info

A vulnerability in Gzip could lead to remote code execution. This is
especially critical for services that automatically gunzip files as part
of vulnerability scanning.

Multiple OS versions are affected.

It is recommended that the latest available version of gzip be applied
to systems which use Gzip.

Thanks,
Brian

Pages