Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system.1. Due to an error in CFNetwork when identifying the file type of certain...
Last Update Date: 28 Jan 2011 Release Date: 10 Jun 2009 5659 Views

RISK: Medium Risk

Medium Risk

Microsoft Active Directory Invalid Free and Memory Leak Vulnerabilities ( 10 June 2009 )

1. Active Directory Invalid Free VulnerabilityA remote code execution vulnerability exists in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability is due to incorrect freeing of memory when processing specially crafted LDAP or LDAPS requests. An attacker who successfully exploited this vulnerability could take...
Last Update Date: 28 Jan 2011 Release Date: 10 Jun 2009 5560 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities ( 10 June 2009 )

1. Race Condition Cross-Domain Information Disclosure VulnerabilityAn information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to the content in another browser window in another domain or Internet Explorer zone. An attacker could exploit the vulnerability by constructing a specially crafted...
Last Update Date: 28 Jan 2011 Release Date: 10 Jun 2009 5412 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Excel Multiple Vulnerabilities ( 10 June 2009 )

A remote code execution vulnerability exists in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker...
Last Update Date: 28 Jan 2011 Release Date: 10 Jun 2009 5428 Views

RISK: Medium Risk

Medium Risk

ACDSee Products TIFF and Font Parsing Buffer Overflow Vulnerabilities

Two vulnerabilities have been identified in various ACDSee products, which could be exploited by attackers to compromise a vulnerable system.1. A buffer overflow error when parsing a specially crafted TIFF image, which could be exploited to crash an affected application or execute arbitrary code by...
Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2009 5700 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime File Processing Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by remote attackers to take complete control of an affected system. These issues are caused by memory corruption, heap overflow, sign extension, and uninitialized memory access errors when processing specially crafted Sorenson 3...
Last Update Date: 28 Jan 2011 Release Date: 3 Jun 2009 5661 Views

RISK: Medium Risk

Medium Risk

Apple iTunes "itms:" URI Handling Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Apple iTunes, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by a stack overflow error when processing a specially crafted "itms:" URL, which could be...
Last Update Date: 28 Jan 2011 Release Date: 3 Jun 2009 5750 Views

RISK: Medium Risk

Medium Risk

Microsoft DirectShow Remote Code Execution Vulnerability

A vulnerability in Microsoft DirectX that could allow remote code execution if user opened a specially crafted QuickTime media file.
Last Update Date: 28 Jan 2011 Release Date: 29 May 2009 5525 Views

RISK: Medium Risk

Medium Risk

BlackBerry Products PDF Distiller Vulnerabilities

Multiple vulnerabilities have been identified in various BlackBerry products, which could be exploited by attackers to compromise a vulnerable device. These issues are caused by memory corruption errors in the PDF distiller of the BlackBerry Attachment Service component when processing malformed PDF files, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 29 May 2009 5594 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which could be exploited by attackers or malicious users to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system. These issues are caused by errors in Java.
Last Update Date: 28 Jan 2011 Release Date: 29 May 2009 5754 Views