[AusNOG] AusCERT Week in Review - Week Ending 11/06/2010 (AUSCERT#20073f686)

Daniel McNamara daniel at auscert.org.au
Fri Jun 11 15:16:49 EST 2010


AusCERT Week in Review

11 June 2010

 

Papers, Articles and other documents:

-------------------------------------

Title: Business as usual for AusCERT 

Date:  10 June 2010

URL:   http://www.auscert.org.au/12907

 

Title: Adobe Flash and Acrobat vulnerability 

Date:  05 June 2010

URL:   http://www.auscert.org.au/12878

 

 

Web Log Entries:

----------------

Title: Microsoft patch week for June 2010 

Date:  09 June 2010

URL:   http://www.auscert.org.au/12902

 

 

Alerts, Advisories and Updates:

-------------------------------

Title: ASB-2010.0144 - [Win][UNIX/Linux] Wireshark: Execute arbitrary

       code/commands - Remote with user interaction 

Date:  11 June 2010

URL:   http://www.auscert.org.au/12912

 

Title: ASB-2010.0145 - [Appliance] McAfee UTM Firewall: Cross-site scripting
-

       Remote with user interaction 

Date:  11 June 2010

URL:   http://www.auscert.org.au/12914

 

Title: ASB-2010.0146 - [Juniper] Juniper Secure Access series (Juniper IVE):

       Cross-site scripting - Remote with user interaction 

Date:  11 June 2010

URL:   http://www.auscert.org.au/12915

 

Title: ASB-2010.0143 - [Win][Linux][Mac][OSX] Google Chrome: Execute
arbitrary

       code/commands - Remote with user interaction 

Date:  10 June 2010

URL:   http://www.auscert.org.au/12906

 

Title: ASB-2010.0142 - [Win] Microsoft Bulletin Notification - June

       Pre-release Announcement 

Date:  08 June 2010

URL:   http://www.auscert.org.au/12886

 

Title: ASB-2010.0139 - ALERT [Win][UNIX/Linux] Adobe Flash & Adobe Reader:

       Execute arbitrary code/commands - Remote with user interaction 

Date:  07 June 2010

URL:   http://www.auscert.org.au/12879

 

Title: ASB-2010.0140 - [Win] Websense Web filtering: Unauthorised access -

       Existing account 

Date:  07 June 2010

URL:   http://www.auscert.org.au/12884

 

Title: ASB-2010.0141 - [Win][Linux][HP-UX][Solaris] Hitachi Web Server:
Denial

       of service - Remote/unauthenticated 

Date:  07 June 2010

URL:   http://www.auscert.org.au/12885

 

 

External Security Bulletins:

----------------------------

Title: ESB-2009.1148.3 - UPDATE [HP-UX] BIND: Denial of service -

       Remote/unauthenticated 

Date:  07 June 2010

OS:    HP-UX, HP-UX 

URL:   http://www.auscert.org.au/11443

 

Title: ESB-2010.0528 - [Win] Sophos Anti-Virus: Administrator compromise -

       Existing account 

Date:  11 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12913

 

Title: ESB-2010.0527 - [UNIX/Linux][Debian] pcsc-lite: Root compromise -

       Existing account 

Date:  11 June 2010

OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Mac OS X, Debian

       GNU/Linux, Ubuntu, HP-UX, Other BSD Variants, SUSE, OpenBSD, AIX,

       FreeBSD, Other Linux Variants 

URL:   http://www.auscert.org.au/12911

 

Title: ESB-2010.0526 - ALERT [UNIX/Linux][Debian] glibc: Multiple

       vulnerabilities 

Date:  11 June 2010

OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Mac OS X, Debian

       GNU/Linux, Ubuntu, HP-UX, Other BSD Variants, SUSE, OpenBSD, AIX,

       FreeBSD, Other Linux Variants 

URL:   http://www.auscert.org.au/12910

 

Title: ESB-2010.0525 - ALERT [Win] Windows Help and Support Center: Execute

       arbitrary code/commands - Remote with user interaction 

Date:  11 June 2010

OS:    Windows 2003, Windows XP 

URL:   http://www.auscert.org.au/12909

 

Title: ESB-2010.0524 - ALERT [Win][Linux][Solaris][Mac][OSX] Adobe Flash

       Player: Multiple vulnerabilities 

Date:  11 June 2010

OS:    Solaris, Windows 2003, Red Hat Linux, Windows 7, Mac OS X, Ubuntu,

       Debian GNU/Linux, Windows XP, SUSE, Windows 2000, Windows Vista,
Other

       Linux Variants, Windows Server 2008 

URL:   http://www.auscert.org.au/12908

 

Title: ESB-2010.0523 - [Win] CA WebScan & PSForm ActiveX control: Execute

       arbitrary code/commands - Remote with user interaction 

Date:  10 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12905

 

Title: ESB-2010.0522 - [Cisco] Cisco Unified Contact Center Express:
Multiple

       vulnerabilities 

Date:  10 June 2010

OS:    Cisco Products 

URL:   http://www.auscert.org.au/12904

 

Title: ESB-2010.0521.2 - UPDATE [Cisco] Cisco Application Extension
Platform:

       Root compromise - Existing account 

Date:  10 June 2010

OS:    Cisco Products, Cisco Products 

URL:   http://www.auscert.org.au/12903

 

Title: ESB-2010.0520 - [Win][Linux][HP-UX][Solaris] HP OpenView Network Node

       Manager: Execute arbitrary code/commands - Remote/unauthenticated 

Date:  09 June 2010

OS:    Solaris, Red Hat Linux, Windows 2003, Windows 7, Debian GNU/Linux,

       Ubuntu, Windows XP, HP-UX, SUSE, Windows 2000, Windows Vista, Windows

       Server 2008, Other Linux Variants 

URL:   http://www.auscert.org.au/12901

 

Title: ESB-2010.0519 - [Win] Microsoft .NET Framework: Provide misleading

       information - Remote/unauthenticated 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12900

 

Title: ESB-2010.0518 - ALERT [Win] Microsoft Internet Information Services

       (IIS): Execute arbitrary code/commands - Remote/unauthenticated 

Date:  09 June 2010

OS:    Windows 2003, Windows 7, Windows Vista, Windows Server 2008 

URL:   http://www.auscert.org.au/12899

 

Title: ESB-2010.0517 - [Win] Microsoft SharePoint: Multiple vulnerabilities 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12898

 

Title: ESB-2010.0516 - [Win][Mac][OSX] Microsoft Office Excel: Multiple

       vulnerabilities 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista, Mac

       OS X, Windows Server 2008 

URL:   http://www.auscert.org.au/12897

 

Title: ESB-2010.0515 - [Win] Microsoft Windows: Increased privileges -

       Existing account 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12896

 

Title: ESB-2010.0514 - [Win] Microsoft Office: Execute arbitrary
code/commands

       - Remote with user interaction 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12895

 

Title: ESB-2010.0513 - ALERT [Win] Microsoft Internet Explorer: Multiple

       vulnerabilities 

Date:  09 June 2010

OS:    Windows 7, Windows Server 2008, Windows Vista, Windows 2003, Windows

       2000, Windows XP 

URL:   http://www.auscert.org.au/12894

 

Title: ESB-2010.0512 - [Win] Microsoft Windows: Execute arbitrary

       code/commands - Remote with user interaction 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12893

 

Title: ESB-2010.0511 - ALERT [Win] Microsoft Windows: Execute arbitrary

       code/commands - Remote with user interaction 

Date:  09 June 2010

OS:    Windows 7, Windows Server 2008, Windows Vista, Windows 2003, Windows

       2000, Windows XP 

URL:   http://www.auscert.org.au/12892

 

Title: ESB-2010.0510 - [Win] Microsoft Windows: Increased privileges -

       Existing account 

Date:  09 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12891

 

Title: ESB-2010.0509 - ALERT [Win][Mac][OSX] Safari: Multiple
vulnerabilities 

Date:  08 June 2010

OS:    Windows XP, Windows 7, Windows Vista, Mac OS X 

URL:   http://www.auscert.org.au/12890

 

Title: ESB-2010.0508 - [Debian] mysql-dfsg-5.0: Multiple vulnerabilities 

Date:  08 June 2010

OS:    Debian GNU/Linux 

URL:   http://www.auscert.org.au/12889

 

Title: ESB-2010.0507 - [RedHat] openoffice.org: Execute arbitrary

       code/commands - Remote with user interaction 

Date:  08 June 2010

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/12888

 

Title: ESB-2010.0506 - [RedHat] perl: Multiple vulnerabilities 

Date:  08 June 2010

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/12887

 

Title: ESB-2010.0505 - [Win] CA ARCserve Backup: Access confidential data -

       Existing account 

Date:  07 June 2010

OS:    Windows 2003, Windows XP, Windows 2000, Windows 7, Windows Vista,

       Windows Server 2008 

URL:   http://www.auscert.org.au/12883

 

Title: ESB-2010.0504 - [UNIX/Linux][Debian] zonecheck: Cross-site scripting
-

       Remote with user interaction 

Date:  07 June 2010

OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Mac OS X, Debian

       GNU/Linux, Ubuntu, HP-UX, Other BSD Variants, SUSE, OpenBSD, AIX,

       FreeBSD, Other Linux Variants 

URL:   http://www.auscert.org.au/12882

 

Title: ESB-2010.0503 - [Win][UNIX/Linux][Debian] openoffice.org: Execute

       arbitrary code/commands - Remote with user interaction 

Date:  07 June 2010

OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Windows 2003, Windows 7,

       Mac OS X, Debian GNU/Linux, Ubuntu, HP-UX, Windows XP, Other BSD

       Variants, SUSE, OpenBSD, Windows 2000, AIX, FreeBSD, Windows Vista,

       Other Linux Variants, Windows Server 2008 

URL:   http://www.auscert.org.au/12881

 

Title: ESB-2010.0502 - [Debian] bind9: Provide misleading information -

       Remote/unauthenticated 

Date:  07 June 2010

OS:    Debian GNU/Linux 

URL:   http://www.auscert.org.au/12880

 

Title: ESB-2010.0396.2 - UPDATE [Solaris][OpenSolaris] sendmail: Provide

       misleading information - Remote with user interaction 

Date:  09 June 2010

OS:    Solaris, Solaris 

URL:   http://www.auscert.org.au/12728

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20100611/0581fbf3/attachment.html>


More information about the AusNOG mailing list