Monday, December 28, 2015

Adobe Flash Player and AIR Critical Security Update

Adobe Flashplayer

Adobe is aware of a report that an exploit for CVE-2015-8651 is being used in limited, targeted attacks and has released an out-of-band critical security update for all versions. It is recommended that this update be installed as soon as possible.

Adobe has released Version 20.0.0.267 for Microsoft Windows and Macintosh.  The Extended Release Version was incremented to Version 18.0.0.324 with this update.

For those who use Adobe AIR, it has been updated to version 20.0.0.233.  The update is available here: https://get.adobe.com/air/

Release date: December 28, 2015
Vulnerability identifier: APSB16-01
CVE number: CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651
Platform: All Platforms

  • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 20.0.0.267.
  • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 18.0.0.324.
  • Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.559.
  • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x and Windows 10, will automatically update to the current version.

Flash Player Update Instructions

It is recommended that you either use the auto-update mechanism within the product when prompted or the direct download links.  The problem with the auto-update mechanism is that it can take a few days to finally provide the update and up to a week if using the "Notify me to install updates" setting.

Flash Player Auto-Update

The update settings for Flash Player versions 10.3 and above can found in the Advanced tab of the Flash Player Settings Manager.  The locations are as follows:
  • Windows: click Start > Settings > Control Panel > Flash Player
  • Macintosh: System Preferences (under Other) click Flash Player
  • Linux Gnome: System > Preferences > Adobe Flash Player
  • Linux KDE: System Settings > Adobe Flash Player
Also note that the Flash Player Settings Manager is where to manage local settings.

Flash Player Direct Download Links

Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras.

    Notes:
    • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
    • Uncheck any toolbar offered with Adobe products if not wanted.
    • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
    • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

    Verify Installation

    To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

    Do this for each browser installed on your computer.

    To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.

    References




    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...



    Thursday, December 24, 2015

    Merry Christmas

    Below is something I put together a few years ago illustrating Ukrainian Christmas Eve.  My Ukrainian-born husband loved the traditions. The background music was his favorite Christmas carol, Shchedryk (Carol of the Bells).



    Wishing family and friends a Merry Christmas

    Khristos Razhdayestsya



    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...


    Tuesday, December 15, 2015

    Firefox Version 43.0 Released with Critical Security Updates


    Firefox
    Mozilla sent Firefox Version 43.0 to the release channel.  The update includes four (4) critical, seven (7) high, three (3) moderate and two (2) low security updates.

    Version 38.5.0 was released for Firefox ESR.

    Fixed in Firefox 43

    • 2015-149 Cross-site reading attack through data and view-source URIs
    • 2015-148 Privilege scalation vulnerabilities in WebExtension APIs
    • 2015-147 Integer underflow and buffer overflow processing MP4 metadata in libstagefright
    • 2015-146 Integer overflow in MP4 playback in 64-bit versions
    • 2015-145 Underflow through code inspection
    • 2015-144 Buffer overflows found through code inspection
    • 2015-143 Linux file chooser crashes on malformed images due to flaws in Jasper library
    • 2015-142 DOS due to malformed frames in HTTP/2
    • 2015-141 Hash in data URI is incorrectly parsed
    • 2015-140 Cross-origin information leak through web workers error events
    • 2015-139 Integer overflow allocating extremely large textures
    • 2015-138 Use-after-free in WebRTC when datachannel is used after being destroyed
    • 2015-137 Firefox allows for control characters to be set in cookies
    • 2015-136 Same-origin policy violation using perfomance.getEntries and history navigation
    • 2015-135 Crash with JavaScript variable assignment with unboxed objects
    • 2015-134 Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)


    What’s New

    • New -- Private Browsing with Tracking Protection offers choice of blocking additional trackers
    • New -- Firefox 64-bit for Windows is now available via the Firefox download page
    • New -- Improved API support for m4v video playback
    • New -- Users can choose search suggestions from the Awesome Bar
    • New -- On-screen keyboard displayed on selecting input field on devices running Windows 8 or greater
    • New
      -- Firefox Health Report has switched to use the same data collection mechanism as telemetry
    • Fixed -- Various security fixes
    • Fixed -- Eyedropper tool does not work as expected when page is zoomed

    Update

    To get the update now, select "Help" from the Firefox menu at the upper left of the browser window, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.

    References


    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...













    Tuesday, December 08, 2015

    Microsoft Security Bulletin Release for December, 2015


    Microsoft released twelve (12) bulletins.  Eight (8) bulletins are identified as Critical and the remaining four (4) are rated Important in severity.

    The updates address vulnerabilities in Microsoft Windows, Microsoft Edge, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Skype for Business, Microsoft Lync Silverlight and Microsoft Silverlight.

    Details about the CVEs can be found in the below-referenced TechNet Security Bulletin.  If you are prioritizing updates, the most critical is MS15-0131.

    Also released today is Microsoft Security Advisory 3123040 which revokes a certificate for *.xboxlive.com where private keys were disclosed.

    Critical:
    • MS15-124 Cumulative Security Update for Internet Explorer (3116180
    • MS15-125 Cumulative Security Update for Microsoft Edge (3116184) 
    • MS15-126 Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3116178) 
    • MS15-127 Security Update for Microsoft Windows DNS to Address Remote Code Execution (3100465)
    • MS15-128 Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503)
    • MS15-129 Security Update for Silverlight to Address Remote Code Execution (3106614)
    • MS15-130 Security Update for Microsoft Uniscribe to Address Remote Code Execution (3108670)
    • MS15-131 Security Update for Microsoft Office to Address Remote Code Execution (3116111)

    Important:
    • MS15-132 Security Update for Microsoft Windows to Address Remote Code Execution (3116162) 
    • MS15-133 Security Update for Windows PGM to Address Elevation of Privilege (3116130
    • MS15-134 Security Update for Windows Media Center to Address Remote Code Execution (3108669)
    • MS15-135 Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3119075)

    Additional Update Notes

    References


      Remember - "A day without laughter is a day wasted."
      May the wind sing to you and the sun rise in your heart...






      Adobe Flash Player and AIR Critical Security Updates

      Adobe Flashplayer

      Adobe has released Version two versions of Adobe Flash Player for Microsoft Windows and Macintosh, Version 20.0.0.228 for IE and Version 20.0.0.235 for plug-in based browsers.  The Extended Release Version was incremented to Version 18.0.0.268 with this update.

      For those who use Adobe AIR, it has been updated to version  20.0.0.204.  The update is available here: https://get.adobe.com/air/

      These updates address critical vulnerabilities that are actively being exploited. It is strongly advised that the updates be applied as soon as possible. Details of the vulnerabilities are included in the below-referenced Security Bulletin. 

      As illustrated in the incredibly long list of CVE's, many vulnerabilities exist in unpatched versions of Flash Player.  It is recommended that date be installed as soon as possible.


      Release date: December 8, 2015
      Vulnerability identifier: APSB15-32

      CVE number: CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8051, CVE-2015-8052, CVE-2015-8053, CVE-2015-8054, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453
      Platform: All Platforms

      • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 20.0.0.228 for IE and 20.0.0.235 for plug-in based browsers
      • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 18.0.0.268.
      • Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.554.
      • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x and Windows 10, will automatically update to the current version.

      Flash Player Update Instructions

      It is recommended that you either use the auto-update mechanism within the product when prompted or the direct download links.  The problem with the auto-update mechanism is that it can take a few days to finally provide the update and up to a week if using the "Notify me to install updates" setting.

      Flash Player Auto-Update

      The update settings for Flash Player versions 10.3 and above can found in the Advanced tab of the Flash Player Settings Manager.  The locations are as follows:
      • Windows: click Start > Settings > Control Panel > Flash Player
      • Macintosh: System Preferences (under Other) click Flash Player
      • Linux Gnome: System > Preferences > Adobe Flash Player
      • Linux KDE: System Settings > Adobe Flash Player
      Also note that the Flash Player Settings Manager is where to manage local settings.

      Flash Player Direct Download Links

      Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras.

        Notes:
        • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
        • Uncheck any toolbar offered with Adobe products if not wanted.
        • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
        • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

        Verify Installation

        To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

        Do this for each browser installed on your computer.

        To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.

        References




        Remember - "A day without laughter is a day wasted."
        May the wind sing to you and the sun rise in your heart...



        Tuesday, November 17, 2015

        Pale Moon Version 25.8.0 Released


        Pale Moon

        Pale Moon has been updated to version 25.8.0.  The update is described as a security, stability and usability update.


        Three of the security updates are identified as DiD, "Defense-in-Depth".  These fixes do not apply to actively exploitable vulnerabilities in Pale Moon.  Rather, the purpose of the updates is to prevent future vulnerabilities caused by the same code when surrounding code changes, exposing the problem.

        Security fixes:

        • Updated the libpng library to 1.5.24 to address critical security issues CVE-2015-7981 and CVE-2015-8126
        • Updated the NSPR library to 4.10.10 to address several security issues.
        • Updated the NSS library to 3.19.4 to address several security issues.
        • Fixed a memory safety hazard in SVG path code (CVE-2015-7199).
        • Fixed an issue with IP address parsing potentially allowing an attacker to bypass the Same Origin Policy (CVE-2015-7188).
        • Fixed an Add-on SDK (Jetpack) issue that would allow scripts to be executed despite being forbidden (CVE-2015-7187).
        • Fixed a crash due to a buffer underflow in libjar (CVE-2015-7194).
        • Fixed an issue for Android full screen that would potentially allow address spoofing (CVE-2015-7185).
        • Added size checks in canvas manipulations to avoid potential image encoding vulnerabilities like CVE-2015-7189. DiD
        • Fixed potential information disclosure vulnerabilities through the NTLM authentication mechanism. Insecure NTLM v1 is now disabled by default, and the workstation name is set to WORKSTATION by default (configurable with a preference for environments where identification of workstations is done by actual reported machine name). This avoids issues like CVE-2015-4515.
        • Fixed a potentially vulnerable crash from a spinning event loop during resize painting. DiD
        • Fixed several Javascript-based memory safety hazards. DiD
        For information on included fixes/changes, see the Release Notes.

        Minimum system Requirements (Windows):
        • Windows Vista/Windows 7/Windows 8/Server 2008 or later
        • A processor with SSE2 support
        • 256 MB of free RAM (512 MB or more recommended)
        • At least 150 MB of free (uncompressed) disk space
        Pale Moon includes both 32- and 64-bit versions for Windows:
        Other versions:

          Update

          To get the update now, select "Help" from the Pale Moon menu at the upper left of the browser window.  Select About Pale Moon > Check for Updates.





          Remember - "A day without laughter is a day wasted."
          May the wind sing to you and the sun rise in your heart...











          Friday, November 13, 2015

          Important Information for Microsoft Outlook 2003, 2007 and 2010 Users


          Outlook.comThe Microsoft Outlook team is notifying users via email about upcoming changes that will result in the inability to access email from @outlook.com, @hotmail, @live or @msn email accounts in Microsoft Outlook 2003, 2007 and 2010.

          Although I may be completely wrong, the notification implies to me that the Outlook.com Preview is ending and the final changes outlined by the Outlook team in May (New ways to get more done in Outlook.com) will be rolling out .

          Regardless, after the changes have been made and email is no longer appearing in the Outlook client, users of Microsoft Outlook 2003, 2007 or 2010 will need to follow the steps documented in the email from the Outlook team, copied below, in order to to resume receiving email from those accounts.

          Update 12DEC2015:  The links below now yield "Internal Server Error".  Fortunately, fellow Microsoft MVP Noel Burgess pointed me to another MVP's website which includes the needed information.  See Diane Poremsky's article, Outlook.com Migration Status.

          "Hello,
          In the next few weeks we’ll be making some updates that will impact your @outlook.com, @hotmail, @live, or @msn email account. Those changes will prevent your email from getting delivered to the Outlook desktop application you use. When you notice that you stop receiving messages, simply follow these two steps:
          For Outlook 2003 customers:
          1. Remove your email account from your Outlook 2003 desktop application
          2. Re-add your email account to your Outlook 2003 desktop application
          For Outlook 2007 customers:
          1. Remove your email account from your Outlook 2007 desktop application
          2. Re-add your email account to your Outlook 2007 desktop application
          For Outlook 2010 customers:
          1. Remove your email account from your Outlook 2010 desktop application
          2. Re-add your email account to your Outlook 2010 desktop application
          When the update happens, you may not be able to refer back to this email in your Outlook desktop application. We recommend bookmarking or saving the two links (remove and re-add) in steps 1 and 2 above that apply to the version of Outlook you’re using. Remember, you can always access this message by logging into your account at www.outlook.com at any time.
          If you don’t know what version of Outlook you have, you can click here for instructions to find out.
          Thanks for your understanding and continued use.
          Sincerely,
          The Outlook team"


          Remember - "A day without laughter is a day wasted."
          May the wind sing to you and the sun rise in your heart...




          Tuesday, November 10, 2015

          Lest We Forget

          Whether you call it Veteran's Day, Armistice Day or Remembrance Day, November 11th is a time to put aside politics and pay tribute to all who died for their country.  It is also a perfect time to thank the Veterans in whatever country you live in. 

          As in previous years, I am republishing my friend Canuk's last tribute and, once again, adding a special thank you to my friends "Phantom Phixer" and "Ghost".

          The comment Canuk posted provides one example of why he was a special person:
          "I too "will remember your friends who never had a full life", while thanking you and your comrades who have served with pride, honesty and honour.

          Despite anyone's thoughts of the current conflict in Iraq - opposition or agreement, we must always remember that these brave young men and women are fighting for a cause they also may or may not agree with. The huge difference between them and us is that they are putting their lives on the line 24/7 while we sit in our homes in comfort, using the freedom of speech previous warriors won for us, and for that they deserve our love, respect, and support."
          LEST WE FORGET




          We Shall Keep the Faith by Moira Michael, November 1918
          Oh! you who sleep in Flanders Fields, Sleep sweet - to rise anew! We caught the torch you threw And holding high, we keep the Faith With All who died. We cherish, too, the poppy red That grows on fields where valor led; It seems to signal to the skies That blood of heroes never dies, But lends a lustre to the red Of the flower that blooms above the dead In Flanders Fields. And now the Torch and Poppy Red We wear in honor of our dead. Fear not that ye have died for naught; We'll teach the lesson that ye wrought In Flanders Fields. Flags courtesy of3DFlags.com








          Remember - "A day without laughter is a day wasted."
          May the wind sing to you and the sun rise in your heart...

          Adobe Flash Player and AIR Security Updates

          Adobe Flashplayer

          Adobe has released Version 19.0.0.245 of Adobe Flash Player for Microsoft Windows and Macintosh.  The Extended Release Version was incremented to Version 18.0.0.261 with this update.

          For those who use Adobe AIR, it has been updated to version 19.0.0.241.  The update is available here: https://get.adobe.com/air/


          These updates address critical vulnerabilities that are actively being exploited. It is strongly advised that the updates be applied as soon as possible. Details of the vulnerabilities are included in the below-referenced Security Bulletin.

          Release date: November 10, 2015
          Vulnerability identifier: APSB15-28

          CVE number: CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046
          Platform: All Platforms

          • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 19.0.0.245. 
          • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 18.0.0.261.
          • Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.548.
          • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x and Windows 10, will automatically update to the current version.

          Flash Player Update Instructions

          It is recommended that you either use the auto-update mechanism within the product when prompted or the direct download links.  The problem with the auto-update mechanism is that it can take a few days to finally provide the update and up to a week if using the "Notify me to install updates" setting.

          Flash Player Auto-Update

          The update settings for Flash Player versions 10.3 and above can found in the Advanced tab of the Flash Player Settings Manager.  The locations are as follows:
          • Windows: click Start > Settings > Control Panel > Flash Player
          • Macintosh: System Preferences (under Other) click Flash Player
          • Linux Gnome: System > Preferences > Adobe Flash Player
          • Linux KDE: System Settings > Adobe Flash Player
          Also note that the Flash Player Settings Manager is where to manage local settings.

          Flash Player Direct Download Links

          Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras.

            Notes:
            • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
            • Uncheck any toolbar offered with Adobe products if not wanted.
            • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
            • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

            Verify Installation

            To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

            Do this for each browser installed on your computer.

            To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.

            References




            Remember - "A day without laughter is a day wasted."
            May the wind sing to you and the sun rise in your heart...


            Microsoft Security Bulletin Release for November, 2015


            Microsoft released twelve (12) bulletins.  Four (4) bulletins are identified as Critical and the remaining eight (8) are rated Important in severity.

            The updates address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Office Services and Web Apps, Microsoft, Skype for Business, Microsoft .NET Framework, Microsoft Edge and Internet Explorer.

            Details about the CVEs can be found in the below-referenced TechNet Security Bulletin.  Watch for the November 2015 "monthly patch review" by Dustin Childs picking up where MSRC has left us hanging. The review can be found on the HP Security Research blog.

            Critical:
            • MS15-112 -- Cumulative Security Update for Internet Explorer (3104517) 
            • MS15-113 -- Cumulative Security Update for Microsoft Edge (3104519) 
            • MS15-114 -- Security Update for Windows Journal to Address Remote Code Execution (3100213)
            • MS15-115 -- Security Update for Microsoft Windows to Address Remote Code Execution (3105864)   
              Important:
              • MS15-116 -- Security Update for Microsoft Office to Address Remote Code Execution (3104540) 
              • MS15-117 -- Security Update for NDIS to Address Elevation of Privilege (3101722) 
              • MS15-118 -- Security Update for .NET Framework to Address Elevation of Privilege (3104507) 
              • MS15-119 -- Security Update for Winsock to Address Elevation of Privilege (3104521) 
              • MS15-120 -- Security Update for IPSec to Address Denial of Service (3102939) 
              • MS15-121 -- Security Update for Schannel to Address Spoofing (3081320) 
              • MS15-122 -- Security Update for Kerberos to Address Security Feature Bypass (3105256) 
              • MS15-123 -- Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3105872)

              Additional Update Notes

              • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. The updated version includes detection for the the following ransomware families:  Crowti, Critroni, Teerac and Tescrypt . Details are available in the MMPC Blog Post.
              • Windows 8.x and Windows 10 -- Non-security new features and improvements for Windows 8.1 and Windows 10 are included with the updates.

              References


                Remember - "A day without laughter is a day wasted."
                May the wind sing to you and the sun rise in your heart...





                Tuesday, November 03, 2015

                Mozilla Firefox Version 42.0 Released with Numerous Security Updates


                Firefox
                Mozilla sent Firefox Version 42.0 to the release channel.  The update includes three (3) critical, five (5) high, seven (7) moderate and two (2) low security updates.

                Version 38.4.0 was released for Firefox ESR.

                Fixed in Firefox 42

                • 2015-133 NSS and NSPR memory corruption issues
                • 2015-132 Mixed content WebSocket policy bypass through workers
                • 2015-131 Vulnerabilities found through code inspection
                • 2015-130 JavaScript garbage collection crash with Java applet
                • 2015-129 Certain escaped characters in host of Location-header are being treated as non-escaped
                • 2015-128 Memory corruption in libjar through zip files
                • 2015-127 CORS preflight is bypassed when non-standard Content-Type headers are received
                • 2015-126Crash when accessing HTML tables with accessibility tools on OS X
                • 2015-125 XSS attack through intents on Firefox for Android
                • 2015-124 Android intents can be used on Firefox for Android to open privileged files
                • 2015-123 Buffer overflow during image interactions in canvas
                • 2015-122 Trailing whitespace in IP address hostnames can bypass same-origin policy
                • 2015-121 Disabling scripts in Add-on SDK panels has no effect
                • 2015-120 Reading sensitive profile files through local HTML file on Android
                • 2015-119 Firefox for Android addressbar can be removed after fullscreen mode
                • 2015-118 CSP bypass due to permissive Reader mode whitelist
                • 2015-117 Information disclosure through NTLM authentication
                • 2015-116 Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)

                What’s New

                • New -- Private Browsing with Tracking Protection blocks certain Web elements that could be used to record your behavior across sites
                • New -- Control Center that contains site security and privacy controls
                • New -- Indicator added to tabs that play audio with one-click muting
                • New -- WebRTC improvements:
                  • IPV6 support
                  • Preferences for controlling ICE candidate generation and IP exposure
                  • Hooks for extensions to allow/deny createOffer/Answer
                  • Improved ability for applications to monitor and control which devices are used in getUserMedia
                • New -- Login Manager improvements:
                  • Improved heuristics to save usernames and passwords
                  • Edit and show all logins in line, Copy/Paste usernames/passwords from the Context menu
                  • Migration imports your passwords to Firefox from Google Chrome for Windows and Internet Explorer; import anytime from the Login Manager
                • Changed -- Improved performance on interactive websites that trigger a lot of restyles
                • HTML5 -- Implemented ES6 Reflect
                • HTML5 -- Support ImageBitmap and createImageBitmap()
                • HTML5 -- Media Source Extension for HTML5 video available for all sites
                • Fixed Various security fixes

                Known Issues

                • unresolved -- URLs containing a Unicode-format Internationalized Domain Name (IDN) are not redirected properly, leading to a Server Not Found error.

                Update

                To get the update now, select "Help" from the Firefox menu at the upper left of the browser window, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.

                References


                Remember - "A day without laughter is a day wasted."
                May the wind sing to you and the sun rise in your heart...












                Wednesday, October 21, 2015

                Oracle Java Quarterly Security Update, October 2015

                java


                Oracle released the scheduled critical security updates for its Java SE Runtime Environment software along with a subsequent update that includes "bug fixes". 

                Unwanted "Extras"

                Although most people do not need Java on their computer, there are some programs and games that require Java.  In the event you need to continue using Java, How-to Geek discovered a little-known and  unpublicized option in the Java Control Panel to suppress the offers for the pre-checked unwanted extras that Oracle has long included with the updates.  Although the Ask Toolbar has been removed, tha does not preclude the pre-checked option for some other unnecessary add-on.

                Do the following to suppress the sponsor offers:
                1. Launch the Windows Start menu
                2. Click on Programs
                3. Find the Java program listing
                4. Click Configure Java to launch the Java Control Panel
                5. Click the Advanced tab and go to the "Miscellaneous" section at the bottom.
                6. Check the box by the “Suppress sponsor offers when installing or updating Java” option and click OK.
                Java suppress sponsor offers

                Windows XP

                For information on Java support for Windows XP, organizations and individuals who must continue using Windows XP and have Java installed are referred to the Oracle blog post, The future of Java on Windows XP (Henrik on Java).

                Update

                If Java is still installed on your computer, it is recommended that this update be applied as soon as possible due to the threat posed by a successful attack.

                Download Information

                Download link:  Java SE 8u65

                Java SE 8u66 can be found here.  Select the appropriate version for your operating system.

                Verify your version:  http://www.java.com/en/download/testjava.jsp

                Notes:
                • UNcheck any pre-checked toolbar and/or software options presented with the update. They are not part of the software update and are completely optional.
                • Starting with Java SE 7 Update 21 in April 2013, all Java Applets and Web Start Applications should be signed with a trusted certificate.  It is not recommended to run untrusted/unsigned Certificates.  See How to protect your computer against dangerous Java Applets

                Critical Patch Updates

                For Oracle Java SE Critical Patch Updates, the next scheduled dates are as follows:
                • 19 January 2016 
                • 19 April 2016 
                • 19 July 2016
                • 18 October 2016

                Java Security Recommendations

                For those people who have desktop applications that require Java and cannot uninstall it, Java can now be disabled in Internet Explorer.  See Microsoft Fix it to Disable Java in Internet Explorer.

                1)  In the Java Control Panel, at minimum, set the security to high.
                2)  Keep Java disabled until needed.  Uncheck the box "Enable Java content in the browser" in the Java Control Panel.

                Java Security

                3)  If you use Firefox or Pale Moon, install NoScript and only allow Java on those sites where it is required.

                Instructions on removing older (and less secure) versions of Java can be found at http://java.com/en/download/faq/remove_olderversions.xml

                References





                Remember - "A day without laughter is a day wasted."
                May the wind sing to you and the sun rise in your heart...


                Thursday, October 15, 2015

                Firefox Version 41.0.2 Released with Security Update


                Firefox
                Mozilla sent Firefox Version 41.0.2 to the release channel.  The update includes one (1) high security update which addresses the vulnerability described in CVE-2015-7184

                No update was released for Firefox ESR which remains at version 38.3.0.

                Fixed in Firefox 41.0.2


                Update

                To get the update now, select "Help" from the Firefox menu at the upper left of the browser window, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.

                References


                Remember - "A day without laughter is a day wasted."
                May the wind sing to you and the sun rise in your heart...











                Wednesday, October 14, 2015

                Pale Moon Minor Updates


                Pale Moon

                Pale Moon has been updated to version 25.7.3.  As explained in the Release Notes, this update is due to Mozilla unexpectedly shutting down their key exchange server and old Sync servers: 

                "This is a usability update needed due to the fact that Mozilla has shut down their key exchange (J-PAKE) server along with the old Sync servers. This was unexpected and required us to set up our own key server (testing indicates this works as-expected, but please do report any issues on the forum) - which also required reconfiguration of the browser.
                Please note that older versions of the browser will no longer be able to link devices to a sync account using the 12-character code since it requires a Mozilla server no longer present. If you need this functionality, you must update to this version or later."


                  Minimum system Requirements (Windows):
                  • Windows Vista/Windows 7/Windows 8/Server 2008 or later
                  • A processor with SSE2 support
                  • 256 MB of free RAM (512 MB or more recommended)
                  • At least 150 MB of free (uncompressed) disk space
                  Pale Moon includes both 32- and 64-bit versions for Windows:
                  Other versions:

                    Update

                    To get the update now, select "Help" from the Pale Moon menu at the upper left of the browser window.  Select About Pale Moon > Check for Updates.





                    Remember - "A day without laughter is a day wasted."
                    May the wind sing to you and the sun rise in your heart...










                    Tuesday, October 13, 2015

                    Microsoft Security Bulletin Release for October 2015


                    Microsoft released six (6) bulletins.  Three (3) bulletins are identified as Critical and the remaining three (3) are rated Important in severity.

                    The updates address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Office Services and Web Apps, Microsoft Server Software, Microsoft Edge and Internet Explorer.

                    Details about the CVEs can be found in the below-referenced TechNet Security Bulletin.  Also see the The monthly patch review – October, 2015 by Dustin Childs -- picking up where MSRC has left us hanging.

                    Critical:
                    • MS15-106 Cumulative Security Update for Internet Explorer (3096441)
                    • MS15-108 Security Update for JScript and VBScript to Address Remote Code Execution (3089659)
                    • MS15-109 Security Update for Windows Shell to Address Remote Code Execution (3096443) 
                      Important:
                      • MS15-107 Cumulative Security Update for Microsoft Edge (3096448)
                      • MS15-110 Security Updates for Microsoft Office to Address Remote Code Execution (3096440) 
                      • MS15-111 Security Update for Windows Kernel to Address Elevation of Privilege (3096447) 

                      Additional Update Notes

                      References




                        Remember - "A day without laughter is a day wasted."
                        May the wind sing to you and the sun rise in your heart...




                        Adobe Reader Critical Quarterly Security Update

                        Adobe
                        Adobe has released the quarterly security update for Adobe Reader and Acrobat XI for Windows and Macintosh. The update addresses numerous critical vulnerabilities and should be installed as soon as possible.

                        Release date: October 13, 2015
                        Vulnerability identifier: APSB15-24
                        CVE numbers: CVE-2015-5583, CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6685, CVE-2015-6686, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-6692, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, CVE-2015-6696, CVE-2015-6697, CVE-2015-6698, CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, CVE-2015-6704, CVE-2015-6705, CVE-2015-6706, CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7615, CVE-2015-7616, CVE-2015-7617, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, CVE-2015-7621, CVE-2015-7622, CVE-2015-7623, CVE-2015-7624
                        Platform: Windows and Macintosh

                        Update or Complete Download

                        Update checks can be manually activated by choosing Help > Check for Updates.
                          Note: UNcheck any pre-checked additional options presented with the update. They are not part of the software update and are completely optional.

                          Windows XP

                          If you are still using Windows XP and have Adobe Reader installed, please note that there will be no additional security updates for it.  I suggest uninstalling it and install an alternate reader.  Personally, I like Sumatra PDF.  It isn't a target and doesn't include unwanted extras with the install or updates.  (See Replacing Adobe Reader with Sumatra PDF.)  Adobe Reference:  End of support | Acrobat and Reader for Windows XP

                          Enable "Protected View"

                          Due to frequent vulnerabilities, it is recommended that Windows users of Adobe Reader and Acrobat ensure that Protected View is enabled.  Neither the Protected Mode or Protected View option is available for Macintosh users.

                          To enable this setting, do the following:
                          • Click Edit > Preferences > Security (Enhanced) menu. 
                          • Change the "Off" setting to "All Files".
                          • Ensure the "Enable Enhanced Security" box is checked. 

                          Adobe Protected View
                          Image via Sophos Naked Security Blog
                          If you are looking for a replacement for Adobe Reader, consider Replacing Adobe Reader with Sumatra PDF.

                          References



                          Home
                          Remember - "A day without laughter is a day wasted."
                          May the wind sing to you and the sun rise in your heart...