May 16, 2020

Microsoft to Fix Eight Vulnerabilities Next Tuesday

(LiveHacking.Com) – Microsoft has published its advance notification for January’s Patch Tuesday. The software giant will release seven bulletins to address eight vulnerabilities in Microsoft Windows and Microsoft Developer Tools And Software. Only one of the bulletins is rated as Critical, the rest are rated as Important. However Important bulletins are still serious as Microsoft defines them as “a vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users data, or of the integrity or availability of processing resources.”

The types of vulnerabilities fixes include remote code execution, elevation of privilege, information disclosure and the less common security feature bypass. A security feature bypass vulnerability can not themselves used by an attacker they can be used to enable the use of another exploit.

Affected Software includes Windows XP, Windows Vista, Windows 7 and Windows Server 2003 and 2008. The security bulletins will be published on January 10, 2012.

Apple Releases QuickTime 7.7.1 for Windows to Fix Vulnerabilities

(LiveHacking.Com) – Apple has released QuickTime 7.7.1 for Windows to fix multiple vulnerabilities that if exploited could allow an attacker to execute arbitrary code, cause a denial-of-service condition, or obtain sensitive information.

According to the security advisory, QuickTime 7.7.1 for Windows 7, Vista and XP, fixes several issues which have either been fixed in OS X (with OS X Lion v10.7.2 or with Security Update 2011-006 for
OS X v10.6 systems) or don’t affect Mac OS X systems.

The problems fixed are:

  • A buffer overflow existed in QuickTime’s handling of H.264 encoded movie files.
  • An uninitialized memory access issue existed in QuickTime’s handling of URL data handlers within movie files.
  • An implementation issue existed in QuickTime’s handling of the atom hierarchy within a movie file.
  • A cross-site scripting issue existed in QuickTime Player’s “Save for Web” export. The template HTML files generated by this feature referenced a script file from a non-encrypted origin. An attacker in a privileged network position may be able to inject malicious scripts in the local domain if the user views a template file locally. This issue is addressed by removing the reference to an online script.
  • A buffer overflow existed in QuickTime’s handling of FlashPix files.
  • A buffer overflow existed in QuickTime’s handling of FLIC files.
  • Multiple memory corruption issues existed in QuickTime’s handling of movie files.
  • An integer overflow issue existed in the handling of PICT files.
  • A signedness issue existed in the handling of font tables embedded in QuickTime movie files.
  • A buffer overflow issue existed in the handling of FLC encoded movie files.
  • An integer overflow issue existed in the handling of JPEG2000 encoded movie files.
  • A memory corruption issue existed in the handling of TKHD atoms in QuickTime movie files.
To exploit most of the these vulnerabilities an attacker would need to create a special crafted movie file and get the victim to watch it on their PC.

Microsoft Likely To Fix MHTML Vulnerability Tomorrow

Microsoft’s Patch Tuesday is tomorrow and there are only three fixes listed in Redmond’s advance notification (compared to the 12 bulletins that addressed 22 vulnerabilities in February’s update). Two of the fixes listed are for Windows and one is for Office. One of the fixes listed for Windows is very likely to be a fix to the MHTML problem. Found in January, it affects all versions of Windows from XP upwards regardless of the version of IE installed on the PC.

MHTML (MIME HTML), is a web page archive format (often with the extension .mht) used to combine HTML, images, Flash etc into a single file. On Windows the MHTML handler is part of Windows and not part of Internet Explorer.

The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting a targeted web site, which in turn could result in information disclosure.

Previously, Microsoft issued a Fixit which locks down the MHTML components of Windows but they failed to patch the problem on February’s Patch Tuesday.

Also noted in Microsoft’s advance notification is the release of an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.

Unscheduled Security Update for Adobe Reader and Acrobat

The unscheduled security update for Adobe Reader and Acrobat to fixes more than 18 security holes. Here is the release note from Adobe Security Bulletin:

Critical vulnerabilities have been identified in Adobe Reader 9.4 (and earlier versions) for Windows, Macintosh and UNIX, and Adobe Acrobat 9.4 (and earlier 9.x versions) for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.

In addition to addressing CVE-2010-3654 noted in Security Advisory APSA10-05 and CVE-2010-4091 referenced in the Adobe PSIRT blog (“Potential issue in Adobe Reader“), these updates also incorporate the Adobe Flash Player update as noted in Security Bulletin APSB10-26.

[ad code=6 align=left]

Adobe recommends users of Adobe Reader 9.4 and earlier versions for Windows and Macintosh update to Adobe Reader 9.4.1, available now. Adobe recommends users of Adobe Reader 9.4 and earlier versions for UNIX update to Adobe Reader 9.4.1, expected to be available on November 30, 2010. Adobe recommends users of Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh update to Adobe Acrobat 9.4.1.

Note that these updates represent an out-of-cycle release. The next quarterly security updates for Adobe Reader and Acrobat are scheduled for February 8, 2011.

Please visit Adobe Security Bulletins for more information about this update.

Source:[Adobe Security Bulletins]

New Cyber Forensic Investigation and System Integrity Software Released; Secure Hash V1.0 Available Today

Released today, a new Windows application to generate digital signatures and verify system integrity. Essential for cyber forensic investigation and useful as an additional security measure ensuring that your system has not been tampered with.

Secure 1st, the network security and cyber forensic specialists, are pleased to announce the release of Secure Hash V1.0. This new Windows application is designed to generate, store and analyse digital signatures. These digital signatures can then be used during a cyber forensic investigation to insure the integrity of the investigation.

[ad code=6 align=left]

Secure Hash scans the hard disk (or any storage media) on a Windows PC and calculates the MD5 and SHA1 hashes of the files and builds a list with other vital information such as file size, location, date of creation and date of modification. The resulting list can be used during a cyber forensic investigation. For example, the investigator may use Secure Hash to save the names, locations and hashes of all the files on a PC during the first stage of the investigation, after the PC has been removed from the crime scene. Later, the investigator could use this information in a court of law or in a lab to generate a report and file list to insure the integrity of the investigation.

Secure Hash also allows for analysis and comparison of the digital signatures. A previously generated list of hashes can be loaded and various filters applied to compare the previous list with the current file states. With filtering, it is easy to discover if any files have been modified, created or deleted as well as finding duplicate files.

“We are very pleased to announce Secure Hash,” said a company spoke person. “This is a simple to use but yet powerful tool. It really is an essential application for anyone doing any kind of cyber forensics.”

Secure Hash is 100% compatible with all versions of Microsoft Windows from Windows 95 to Windows 7 including the 64 bit variants.

About Secure 1st

Secure 1st is an information security company which specializes in Computer Forensic Solutions, Computer Forensic Training Services, and Computer Forensic Consultancy Services. Secure 1st helps its clients to develop and maintain an integrated security infrastructure that can prevent and minimize the effect of possible security lapses.

Damage limitation: Mitigating exploits with Microsoft’s EMET

Security vulnerabilities in applications have become an everyday problem. Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) activates extra protection mechanisms included in recent versions of Windows, which are able to frustrate many attacks. However, getting the configuration right can sometimes be harder than you might think.

Source: [TheHSecurity]

Read the full article here.

Auto Update your Programs – Secunia PSI 2.0 Public Beta

Secunia released version 2 of its Personal Software Inspector (PSI) application.

With reference to Secunia blog, The core of the Secunia PSI, the scan engine or the Secunia Software Inspector technology has remained practically untouched and it is still the most accurate scanning engine available for detecting installed programs and missing security updates on the Windows platform.

The Secunia PSI uses the same framework and engine which has been used in Secunia commercial solutions, like the Secunia CSI, which is used by some of the largest and most security conscious companies and organisations in the world.

Download Secunia PSI:


The H Security: Microsoft continues to workaround DLL vulnerability

Users wishing to use Microsoft’s tool (released last week) to block the DLL vulnerability present in a wide range of programs may find that they have a problem. If the setting for the manually created CWDIllegalInDllSearch registry entry in the ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager’ path is too strict, programs including Google’s Chrome web browser may become unusable. Microsoft has now released a ‘fix-it’ solution which automatically generates the key and sets it to the less severe value of ‘2’ – this protects users from direct DLL hijacking from network shares. The fix-it requires the original tool to have been previously installed. Microsoft is currently considering distributing it via Windows Update.

Read the full article here.


[ad code=2 align=center]

Kernel-level Vulnerability in All versions of the Microsoft Windows

According to, researchers have identified a kernel-level vulnerability in Windows. This vulnerability allows attackers to gain escalated privileges and may also allow them to remotely execute malicious code. All versions of the Microsoft OS are affected, including Windows 7.

The buffer overflow, which was originally reported, can be exploited to escalate privileges or crash vulnerable machines, IT research company Vupen said. The flaw may also allow attackers to execute arbitrary code with kernel privileges.

Read more about this vulnerability here.