IncrediMail Fully Compatible With Google’s Gmail

Trend Towards Offering Free POP3 Access Benefits Growing 43-Million Strong IncrediMail Community Every single one of Google’s Gmail users can now enjoy the creative advantages of IncrediMail, the program dedicated to personalizing E-mail – available at http://www.IncrediMail.com. From today, it is fully compatible with Google’s tool, enabling users to quickly and easily add value to their Gmail by exploiting IncrediMail’s array of specialized features for customized email. “Gmail has made the right move by offering free POP3 access to its users,” commented IncrediMail CEO and Co-founder Yaron Adler. “Consumers want more access, not less. And as opposed to others, Gmail … Continue reading IncrediMail Fully Compatible With Google’s Gmail

Shavlik HFNetChkPro Extended to Include Industry’s First Integrated Anti-Spyware and Patch Management Product for the Enterprise

Shavlik Technologies, LLC, a leading provider of software security solutions, today announced Shavlik NetChk Spyware, its new anti-spyware product.  Unlike most anti-spyware solutions currently on the market, Shavlik NetChk Spyware is designed specifically for the enterprise and is not simply an enhanced version of a home user product.  It is also fully integrated with Shavlik’s widely-used patch management product, Shavlik HFNetChkPro. Spyware has become an increasingly challenging problem for corporations around the world and can adversely impact productivity, decrease bandwidth and compromise network security by allowing computer hackers a foothold to systems.  Generally, spyware is defined as any type of … Continue reading Shavlik HFNetChkPro Extended to Include Industry’s First Integrated Anti-Spyware and Patch Management Product for the Enterprise

Java Runtime Environment Remote Denial-of-Service (DoS) Vulnerability

A vulnerability in the Java Runtime Environment (JRE) involving object deserialization could be exploited remotely to cause the Java Virtual Machine to become unresponsive, which is a type of Denial-of-Service (DoS). This issue can affect the JRE if an application that runs on it accepts serialized data from an untrusted source. Sun acknowledges with thanks, Marc Schoenefeld, for bringing this issue to our attention. Resolution This issue is addressed in the following releases: SDK and JRE 1.4.2_06 and later for Windows, Solaris, and Linux J2SE releases are available for download at: J2SE 5.0 at http://java.sun.com/j2se/1.5.0/download.jsp J2SE 1.4.2_06 at http://java.sun.com/j2se/1.4.2/download.html and … Continue reading Java Runtime Environment Remote Denial-of-Service (DoS) Vulnerability

Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation

Vulnerable: Linux kernel 2.6.*, Linux kernel 2.5.72-lsm1Unvulnerable: Linux kernel 2.4 When POSIX Capability LSM module isn’t compiled into kernel, after inserting capability module into kernel, all existed normal users processes will have total Capability privileges of superuser (root).  POSIX.1e Capability is a very important component of Linux kernel. In original Linux Kernel, system security relies on it and DAC mainly. In new kernel version, Linux Security Modules (LSM) framework is introduced to provide a lightweight, general-purpose framework for access control. Some Linux security projects are ported to LSM and accepted by kernel source, such as POSIX.1e Capability and SE-Linux. Users can compile … Continue reading Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation

Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability

Vulnerable:  Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003 Not vulnerable:  Windows XP SP2 Parsing a specially crafted ANI file causes the windows kernel to crash or stop to work properly. An attacker can crash or freeze a target system if he sends a specially crafted ANI file within an HTML page or within an Email. More info in http://www.securityfocus.com/archive/1/385340/2004-12-20/2004-12-26/0

Microsoft Windows LoadImage API Integer Buffer overflow

Vulnerable:  Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003 An exploitable integer buffer overflow exists in the LoadImage API of the USER32 Lib. This function loads an icon, a cursor or a bitmap and then try to proceed the image. If an attacker sends a specially crafter bmp, cur, ico or ani file within an HTML page or in an Email, it is then possible to run arbitrary code on the affected system. Complete details in http://www.securityfocus.com/archive/1/385342/2004-12-20/2004-12-26/2

Microsoft Windows winhlp32.exe Heap Overflow Vulnerabilities

Vulnerable:  Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003 There is a vulnerability in Microsoft Windows .hlp file parsing program winhlp32.exe. The vulnerability is caused due to a decoding error within the windows .hlp header processing.This can be exploited to cause a heap-based buffer overflow. Complete details in http://www.securityfocus.com/archive/1/385332/2004-12-20/2004-12-26/2

US-CERT released summary of security items from Dec. 15-21, 2004

Cyber Security Bulletin SB04-357 – Summary of Security Items from December 15 through December 21, 2004 – http://www.us-cert.gov/cas/bulletins/SB04-357.html This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to items appearing in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the “system” may be impacted. The Recent Exploit/Technique table contains a “Workaround or Patch Available” column that indicates whether a workaround or patch has been published for … Continue reading US-CERT released summary of security items from Dec. 15-21, 2004

Permission problem in Skype BETA for linux

Product: Skype (http://skype.com/) Affected versions: Linux RPM’s version 0.92.0.12, possibly others.  (Linux versions are marked as “BETA”) Problem Description: During installation a world-writable directory “/usr/share/skype/lang” is created. Impact:  The directory (presumably) contains various language files used by the skype application. An attacker could modify these files. It is unknown if this could be used for attacking local users running the skype application. Solution:  The problem seems to be fixed in version 0.93.0.3, which is currently available for download from the skype website. History:  – Vendor notified on 19-Nov-2004 – Vendor acknowledged problem within 40 minutes – Fixed version available since 21-Dec-2004 http://www.securityfocus.com/archive/1/385235/2004-12-19/2004-12-25/0