securityadmin's blog

Vulnerability in Microsoft DirectShow Could and Is Allowing Remote Code Execution

http://www.microsoft.com/technet/security/advisory/971778.mspx

A vulnerability in the DirectX component DirectShow could allow remote
code execution when users open a malicious Quicktime file.

Exploits for this vulnerability have been reported in the wild and
confirmed by Microsoft.

http://www.securityfocus.com/brief/969?ref=rss

Remote exploit of Apple Quicktime and iTunes patched

http://www.vnunet.com/vnunet/news/2243390/apple-posts-pair-updates

The iTunes 8.2 and QuickTime 7.6.2 updates fix 9 flaws spanning both
Windows and Macintosh versions. These vulnerabilities could lead to
remote code execution on a user's machine.

All of these vulnerabilities require a user to download malicious media
files, or open them in an attachment.

It is recommended that users patch to the latest version of iTunes and
Quicktime.

VMware Hosted products and ESX and ESXi patches resolve security issues

http://www.vmware.com/security/advisories/VMSA-2009-0007.html

a) VMware Descheduled Time Accounting driver vulnerability may cause a
denial of service in Windows based virtual machines.
b) Updated libpng package for the ESX 2.5.5 Service Console. A buffer
overflow in the 2.5.5 could lead to arbitrary code execution.

Relevant releases

VMware Hosted products and ESX and ESXi patches resolve security issues

http://www.vmware.com/security/advisories/VMSA-2009-0007.html

a) VMware Descheduled Time Accounting driver vulnerability may cause a
denial of service in Windows based virtual machines.
b) Updated libpng package for the ESX 2.5.5 Service Console. A buffer
overflow in the 2.5.5 could lead to arbitrary code execution.

Relevant releases

httpd security update fixes remote DOS and local server side includes vulnerability

http://rhn.redhat.com/errata/RHSA-2009-1075.html

Updated httpd packages that fix two security issues are now available for
Red Hat Enterprise Linux 5. The DoS bug only affects RHEL5.3.

Apache should be updated to the latest package on all RHEL machines
serving web pages.

Thanks,
Brian

httpd security update fixes remote DOS and local server side includes vulnerability

http://rhn.redhat.com/errata/RHSA-2009-1075.html

Updated httpd packages that fix two security issues are now available for
Red Hat Enterprise Linux 5. The DoS bug only affects RHEL5.3.

Apache should be updated to the latest package on all RHEL machines
serving web pages.

Thanks,
Brian

Multiple Vulnerabilities in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Remote Arbitrary Code Execution

http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1

Solaris 8 and 9 sadmind contains heap and integer overflow
vulnerabilities. This could lead to local or remote unprivileged
execution of arbitrary code with root privilege.

This does not affect Solaris 10 or OpenSolaris which does not come with
sadmind.

Affected versions:

SPARC Platform:
- Solaris 8 without patch 116455-02
- Solaris 9 without patch 116453-03

Multiple Vulnerabilities in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Remote Arbitrary Code Execution

http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1

Solaris 8 and 9 sadmind contains heap and integer overflow
vulnerabilities. This could lead to local or remote unprivileged
execution of arbitrary code with root privilege.

This does not affect Solaris 10 or OpenSolaris which does not come with
sadmind.

Affected versions:

SPARC Platform:
- Solaris 8 without patch 116455-02
- Solaris 9 without patch 116453-03

Multiple Symantec Products Intel Common Base Agent Remote Command Execution Vulnerability

http://www.securityfocus.com/bid/34671/info

An exploit concerning various versions of SAV is in the wild. It allows
for remote exploitation of machines with SYSTEM privileges.

Symantec has released updates and patches to fix the issue.

Please read their release notes for further information.

Pages