"MIT Kerberos is prone to a remote denial-of-service vulnerability in
An attacker may exploit this issue to cause the affected application to
crash, denying service to legitimate users.
MIT Kerberos 5 1.5 through 1.6.3 are vulnerable. "
Patches are available for MIT Kerberos, RHEL and Ubuntu. It is
recommended that users upgrade to the latest release to avoid exploitation.
Tuesday, April 13, 2010 is patch Tuesday. Microsoft released this
bulletin summarizing the patches it will release.
8 of these patches mitigate remotely exploitable vulnerabilities.
Users should install these patches during their regular patch Tuesday
A design feature in PDF allows for the execution of a program from
within the PDF. Most PDF readers supply a warning about executing the
program before continuing.
A researcher last week showed how the warning message could be rewritten
by a malicious PDF and trick the user into allowing it to execute. It
could potentially infect other PDFs or run whatever the attacker desired.
"An XSS vulneravility has been discovered in NextGEN Gallery, a
very popular and commonly used plugin for the Wordpress content
management system commonly found as a blogging platform. This
vulnerability results from reflected unsanitized imput that can be
crafted into an attack by a malicious user by manipulating the mode
parameter of the xml/media-rss.php script."
"Safari is prone to an integer overflow vulnerability.
Successfully exploiting this issue may allow remote attackers to execute
arbitrary code in the context of the application. Failed attacks will
likely cause denial-of-service conditions."
Apple has released version 4.0.5 of the software. It is recommended
that users update to this release.
"Due to the threat posed by a successful attack, Oracle strongly
recommends that customers apply CPU fixes as soon as possible. This
Critical Patch Update contains 27 new security fixes across all products.
Supported Products Affected
"Foxit Reader is prone to a remote code-execution vulnerability because
it fails to properly restrict access to certain functionality.
An attacker can exploit this issue by enticing a user to open a
malicious PDF file.
Successful exploits may allow the attacker to execute arbitrary code or
commands in the context of a user running the affected application.