ep's blog

Thunderbird 3.0.1 Security Update Now Available


3.0.1 fixes three MFSA's.

* MFSA 2009-65: (Critical) Crashes with evidence of memory
corruption (rv:

* MFSA 2009-66: (Critical) Memory safety fixes in liboggplay media library

* MFSA 2009-67: (Critical) Integer overflow, crash in libtheora video

It is recommended that Thunderbird 3 users update to this latest version.


StopBadware will operate as non-profit


"StopBadware, an anti-malware effort started at Harvard University’s Berkman Center for Internet and Society, has announced that it has begun operating as a standalone non-profit organization called StopBadware, Inc. Google, PayPal and Mozilla have provided initial funding for the launch."

Vulnerability in Internet Explorer Could Allow Information Disclosure


Thanks to Chris for the tip.

Microsoft is reporting a new vulnerability in IE that could lead to
information disclosure of files with known filenames to a remote attacker.

"[If] a user is using a version of Internet Explorer that is not running
in Protected Mode an attacker may be able to access files with an
already known filename and location."

What should I do about illegal activity in an email?

Sometimes you might receive a fraudulent email asking you for personal information that could be used for illegal activities.  A lot of people just delete the email and move on.  But, what if you want to notify someone?  What if the scam is very convincing and you want someone to look into it?

Here are some tips on what to do in this situation.

GNU Gzip Dynamic Huffman Decompression Remote Code Execution Vulnerability


A vulnerability in Gzip could lead to remote code execution. This is
especially critical for services that automatically gunzip files as part
of vulnerability scanning.

Multiple OS versions are affected.

It is recommended that the latest available version of gzip be applied
to systems which use Gzip.


Microsoft Internet Explorer (CVE-2010-0247) Uninitialized Memory Remote Code Execution Vulnerability (IE5 and IE6)


This remote code execution vulnerability only affects IE5 and IE6.
Please see the link above for more information.

It is recommended that users of IE5 or IE6 patch to the latest version,
upgrade to IE8 or use an alternative browser to mitigate this risk.