Secunia Weekly Advisory 28 janvier 2010

La veille de sécurité Secunia, si vous n'avez pas encore patché votre Internet Explorer pour les fameuses multiples failles de la fin de semaine dernière c'est ici

Pour le reste Adobe encore en vedette, avec cependant un petit nouveau avec l'arrivée de Chrome, Kasperky reste discret sur sa faille KAV 2010...

========================================================================
 
                  The Secunia Weekly Advisory Summary                 
                        2010-01-21 - 2010-01-28                       
 
                       This week: 56 advisories                       
 
========================================================================
Table of Contents:
 
1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers
 
========================================================================
1) Word From Secunia:
 
Secunia CSI 4.0
 - integrated with Microsoft WSUS for 3rd Party Patch Management
 
Secunia is currently conducting beta testing of the new patch management capabilities in cooperation with selected customers and partners.
 
Public beta testing of Secunia CSI 4.0 integrated with Microsoft WSUS for 3rd Party Patch Management is expected in mid-February, 2010.
 
You can sign-up now to participate.
 
Read more:
 
Sign up:
 
========================================================================
2) This Week in Brief:
 
Chrome vulnerability discovered by Secunia:
 
--
 
Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system.
 
For more information:
 
--
 
A vulnerability has been discovered in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information.
 
For more information:
 
========================================================================
3) This Weeks Top Ten Most Read Advisories:
 
For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions:
 
1. [SA38209] Microsoft Internet Explorer Multiple
              Vulnerabilities
2. [SA24314] Internet Explorer Charset Inheritance
              Cross-Site Scripting Vulnerability 3. [SA37584] Adobe Flash Player Multiple Vulnerabilities 4. [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities 5. [SA37769] Google Chrome Multiple Vulnerabilities 6. [SA38061] Google Chrome Stylesheet Redirection Information
              Disclosure
7. [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities 8. [SA38265] Microsoft Windows "KiTrap0D" Privilege Escalation
              Vulnerability
9. [SA37888] Adobe Shockwave Player 3D Model Parsing Eight
              Vulnerabilities
10. [SA37699] Mozilla Firefox Multiple Vulnerabilities
 
========================================================================
4) This Week in Numbers
 
During the past week 56 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business.
 
This weeks Secunia Advisories had the following spread across platforms and criticality ratings:
 
Platforms:
 Windows             :      2 Secunia Advisories
 Unix/Linux          :     28 Secunia Advisories
 Other               :      3 Secunia Advisories
 Cross platform      :     23 Secunia Advisories
 
Criticality Ratings:
 Extremely Critical :      0 Secunia Advisories
 Highly Critical     :      6 Secunia Advisories
 Moderately Critical :     21 Secunia Advisories
 Less Critical       :     24 Secunia Advisories
 Not Critical        :      5 Secunia Advisories
 
========================================================================
 
Secunia recommends that you verify all advisories you receive, by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use those supplied by the vendor.
 
Definitions: (Criticality, Where etc.)
 
Subscribe:
 
Contact details:
Tel   : +45 70 20 51 44
Fax   : +45 70 20 51 45