Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Media File Processing Vulnerabilities( 12 August 2009 )

1. Malformed AVI Header VulnerabilityA remote code execution vulnerability exists in the way Microsoft Windows handles specially crafted AVI format files. This vulnerability could allow code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, ...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 3771 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Web Components Multiple Vulnerabilities( 12 August 2009 )

1. Office Web Components Memory Allocation VulnerabilityA remote code execution vulnerability exists in the Office Web Components ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 3787 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Desktop Connection Heap Overflow Vulnerabilities( 12 August 2009 )

1. Remote Desktop Connection Heap Overflow VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Remote Desktop Connection (formerly known as Terminal Services Client) processes specific parameters returned by the RDP server. An attacker who successfully exploited this vulnerability could take complete control of...
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 3892 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Unauthenticated Denial of Service in ASP.NET Vulnerability( 12 August 2009 )

A Denial of Service vulnerability exists in the way ASP.NET manages request scheduling. An attacker could exploit this vulnerability by creating specially crafted anonymous HTTP requests that would cause the affected Web server to become non-responsive until the associated application pool is restarted.
Last Update Date: 28 Jan 2011 Release Date: 12 Aug 2009 3965 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by remote or local attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by out-of-bounds...
Last Update Date: 28 Jan 2011 Release Date: 7 Aug 2009 4016 Views

RISK: Medium Risk

Medium Risk

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.1. An error in the SOCKS proxy implementation, which may allow an...
Last Update Date: 28 Jan 2011 Release Date: 6 Aug 2009 3944 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, which could be exploited by attackers to manipulate certain data, disclose sensitive information or compromise a vulnerable system.1. Due to an error when handling a SOCKS5 proxy reply containing an overly long DNS name, which could...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2009 3946 Views

RISK: Medium Risk

Medium Risk

Apple iPhone SMS Processing Memory Corruption Vulnerability

A vulnerability has been identified in Apple iPhone, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by a memory corruption error when processing a malformed SMS message, which could be exploited to cause...
Last Update Date: 28 Jan 2011 Release Date: 4 Aug 2009 4354 Views

RISK: Medium Risk

Medium Risk

Mozilla Products NSS Code Execution and Security Bypass Vulnerabilities

Two vulnerabilities have been identified in Mozilla Firefox, Thunderbird and Seamonkey, which could be exploited by remote attackers to bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in NSS. 1. A heap overflow in a regular expression parser when...
Last Update Date: 28 Jan 2011 Release Date: 4 Aug 2009 3963 Views

RISK: Medium Risk

Medium Risk

Adobe Flash Player and AIR Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and AIR, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or compromise a vulnerable system. These issues are caused by memory corruption, buffer overflow, privilege escalation, null pointer, sandbox...
Last Update Date: 28 Jan 2011 Release Date: 3 Aug 2009 3994 Views