Tuesday, April 13, 2010 is patch Tuesday. Microsoft released this
bulletin summarizing the patches it will release.
8 of these patches mitigate remotely exploitable vulnerabilities.
Users should install these patches during their regular patch Tuesday
"MIT Kerberos is prone to a remote denial-of-service vulnerability in
An attacker may exploit this issue to cause the affected application to
crash, denying service to legitimate users.
MIT Kerberos 5 1.5 through 1.6.3 are vulnerable. "
Patches are available for MIT Kerberos, RHEL and Ubuntu. It is
recommended that users upgrade to the latest release to avoid exploitation.
A design feature in PDF allows for the execution of a program from
within the PDF. Most PDF readers supply a warning about executing the
program before continuing.
A researcher last week showed how the warning message could be rewritten
by a malicious PDF and trick the user into allowing it to execute. It
could potentially infect other PDFs or run whatever the attacker desired.
"Safari is prone to an integer overflow vulnerability.
Successfully exploiting this issue may allow remote attackers to execute
arbitrary code in the context of the application. Failed attacks will
likely cause denial-of-service conditions."
Apple has released version 4.0.5 of the software. It is recommended
that users update to this release.
A POC exploit has been written that can crash Safari on the Apple iPhone
when the user visits a maliciously crafted webpage. This affects:
Apple iPhone 3.1.3
Apple iPhone 3.1.2
Apple iPhone 3.0.1
Apple iPhone 3.1
Apple iPhone 3.0
The POC claims the ability to execute arbitrary code via this exploit.
Apple has not yet released a patch or verified this issue.
Thanks to David for this article. In it Ars Technica covers a report by BeyondTrust on Windows vulnerabilities in 2009. It compares the vulnerability on Windows 2000 through Windows 7, and whether a user has admin rights or not.
If nothing else, this article speaks to why regular users are better protected if they run without administrative privileges.
"A buffer overflow vulnerability exists in the Broadcom NetXtreme
management firmware. This vulnerability may allow a remote attacker to
execute arbitrary code on an affected device."
This affects the firmware on the card itself, regardless of whether the
machine is turned on or off. Both Dell and HP use these cards in their
desktops and servers.
The following devices/firmwares are affected:
I don't know about you, but I cringe every time I go to an ATM nowadays. "Why?" you ask. Because I've heard of a lot of reports and seen a lot of pictures of ATM skimmers. These devices attach to the front of an ATM where your card goes in. When you insert your card, they scan it as well as the ATM. Now they can create a copy of your card.