Blogs

Apache HTTP Server 2.2.22 Released

http://www.apache.org/dist/httpd/Announcement2.2.html

Six security issues were fixed in Apache 2.2.22, including information disclosure, privilege escalation and DoS vulnerabilities.

"SECURITY: CVE-2011-3368 (cve.mitre.org) Reject requests where the request-URI does not match the HTTP specification, preventing unexpected expansion of target URLs in some reverse proxy configurations.

Canadian Privacy Commissioner Unveils New Tools to Help Young Internet Users Protect Their Privacy


http://www.priv.gc.ca/media/nr-c/2012/nr-c_120124_e.cfm#contenttop


I think that the materials that the Privacy Commissioner of Canada is promoting are great.  Everyone should follow the advice they present to teach their families about online privacy.  Here are the links to three great tools they have launched on their www.youthprivacy.ca website.

Microsoft Security Advisory (2639658) Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege

https://technet.microsoft.com/en-us/security/advisory/2639658

"A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts.

Successful exploitation allows execution of arbitrary code."

Apple Releases Multiple Security Updates

http://www.us-cert.gov/current/index.html#apple_releases_multiple_securi...

"Apple has released security updates for Apple iOS, Safari 5.1.1, OS X Lion v10.7.2, iWork 09, and Apple TV 4.4 to address multiple vulnerabilities. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, obtain sensitive information, and bypass security restrictions.

Apache HTTP Server: mod_proxy reverse proxy exposure

http://seclists.org/fulldisclosure/2011/Oct/232

"When using the RewriteRule or ProxyPassMatch directives to configure a
reverse proxy using a pattern match, it is possible to inadvertently
expose internal servers to remote users who send carefully crafted
requests. The server did not validate that the input to the pattern
match was a valid path string, so a pattern could expand to an
unintended target URL."

Security update available for Adobe Flash Player (APSB11-26)

http://www.adobe.com/support/security/bulletins/apsb11-26.html

"Critical vulnerabilities have been identified in Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

Pages