La veille de sécurité Secunia, si vous n'avez pas encore patché votre Internet Explorer pour les fameuses multiples failles de la fin de semaine dernière c'est ici
Pour le reste Adobe encore en vedette, avec cependant un petit nouveau avec l'arrivée de Chrome, Kasperky reste discret sur sa faille KAV 2010...
========================================================================
The Secunia Weekly Advisory Summary
2010-01-21 - 2010-01-28
This week: 56 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4..................................................This Week in Numbers
========================================================================
1) Word From Secunia:
Secunia CSI 4.0
- integrated with Microsoft WSUS for 3rd Party Patch Management
Secunia is currently conducting beta testing of the new patch management capabilities in cooperation with selected customers and partners.
Public beta testing of Secunia CSI 4.0 integrated with Microsoft WSUS for 3rd Party Patch Management is expected in mid-February, 2010.
You can sign-up now to participate.
Read more:
Sign up:
========================================================================
2) This Week in Brief:
Chrome vulnerability discovered by Secunia:
--
Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system.
For more information:
--
A vulnerability has been discovered in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information.
For more information:
========================================================================
3) This Weeks Top Ten Most Read Advisories:
For more information on how to receive alerts on these vulnerabilities, subscribe to the Secunia business solutions:
1. [SA38209] Microsoft Internet Explorer Multiple
Vulnerabilities
2. [SA24314] Internet Explorer Charset Inheritance
Cross-Site Scripting Vulnerability 3. [SA37584] Adobe Flash Player Multiple Vulnerabilities 4. [SA37690] Adobe Reader/Acrobat Multiple Vulnerabilities 5. [SA37769] Google Chrome Multiple Vulnerabilities 6. [SA38061] Google Chrome Stylesheet Redirection Information
Disclosure
7. [SA37231] Sun Java JDK / JRE Multiple Vulnerabilities 8. [SA38265] Microsoft Windows "KiTrap0D" Privilege Escalation
Vulnerability
9. [SA37888] Adobe Shockwave Player 3D Model Parsing Eight
Vulnerabilities
10. [SA37699] Mozilla Firefox Multiple Vulnerabilities
========================================================================
4) This Week in Numbers
During the past week 56 Secunia Advisories have been released. All Secunia customers have received immediate notification on the alerts that affect their business.
This weeks Secunia Advisories had the following spread across platforms and criticality ratings:
Platforms:
Windows : 2 Secunia Advisories
Unix/Linux : 28 Secunia Advisories
Other : 3 Secunia Advisories
Cross platform : 23 Secunia Advisories
Criticality Ratings:
Extremely Critical : 0 Secunia Advisories
Highly Critical : 6 Secunia Advisories
Moderately Critical : 21 Secunia Advisories
Less Critical : 24 Secunia Advisories
Not Critical : 5 Secunia Advisories
========================================================================
Secunia recommends that you verify all advisories you receive, by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Definitions: (Criticality, Where etc.)
Subscribe:
Contact details:
Web : http://secunia.com/
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45