- APSA09-04 Security Advisory for Adobe Flash Player
- APSB09-11 Security Update available for Shockwave Player
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
Java SE 6u15 was pulled from the download site. According to the Advance notification of Security Updates for Java SE published by Sun yesterday, the release has been rescheduled for Tuesday, August 4.
Consider upgrading to Internet Explorer 8 to benefit from enhanced security and protections.
For additional information, see the MSRC blog post: Microsoft Security Advisory 973882, Microsoft Security Bulletins MS09-034 and MS09-035 Released"While we can’t go into specifics about the issue prior to release, we can say that the Visual Studio bulletin will address an issue that can affect certain types of applications. The Internet Explorer bulletin will provide defense-in-depth changes to Internet Explorer to help provide additional protections for the issues addressed by the Visual Studio bulletin. The Internet Explorer update will also address vulnerabilities rated as Critical that are unrelated to the Visual Studio bulletin that were privately and responsibly reported."
Maximum Severity Rating: ModerateBulletin ID: Internet Explorer
Vulnerability Impact: Remote Code Execution
Restart Requirement: Requires restart
Affected Software: Microsoft Visual Studio .NET 2003, Microsoft Visual Studio 2005, Microsoft Visual Studio 2008, Microsoft Visual C++ 2005, and Microsoft Visual C++ 2008
Maximum Severity Rating: Critical
Vulnerability Impact: Remote Code Execution
Restart Requirement: Requires restart
Affected Software: Internet Explorer on Windows 2000, Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008
"Yet again we find the same group "ISystem Inc" scamming the public with their bogus products ... with a little more help from Comodo. Now I ask you ... how many times do I have to report the same group being issued a certificate from Comodo, before they take the necessary steps to prevent the general public from being ripped-off by these bad actors?"See the complete report at Hosts News, Comodo continues to ignore Malware warnings.
". . . when tested with Internet Explorer and the latest Flash player (version 10), the exploit silently drops a Trojan and works "as advertised". Another interesting thing I noticed is that the Trojan, which is downloaded in the second stage, is partially XOR-ed – the attackers probably did this to evade IDSes or AV programs scanning HTTP traffic. At the moment, the detection for both the exploit and the Trojan is pretty bad (only 7/41 for the Trojan, according to VirusTotal).
It appears that even when JavaScript support is disabled in Adobe Reader that the exploit still works, so at the moment there are no reliable protection mechanisms (except not using Adobe Reader?). Regarding Flash, NoScript is your best help here, of course."
"The final few minutes before RTM are a sign-off process where each and every team that contributed to Windows formally commits to having successfully executed the work necessary for the product to be in the release process. We gather one last time (for Windows 7) in the “Ship Room” and a representative from each team signs (literally) and signifies their team’s readiness for manufacturing. We thought we’d share this moment with you here today."
16.1.2009.0
"This new portal contains several new features including stream-lined sample submission and tracking, which is made possible by creating an MMPC profile. When you log in, the information saved in your MMPC profile auto-populates the sample submission form, thereby expediting the submission process. You can then monitor the status of your submission online – if you are logged in (using your MMPC profile) while submitting a sample, we will allow you to view details for all samples you have submitted in the past. In effect we now have ‘one stop shopping’ for sample submission and tracking."RSS feeds are now available for the MMPC encyclopedia entries, active malware lists, and the change log. In addition, the new security blog aggregator page on the Trustworthy Computing Microsoft web site is planned to be live tomorrow.
"Mike Christenson, the person responsible for the PM you quoted, is no longer part of Emsi Software GmbH. He was fired today (actually yesterday) as soon as we became aware of the mails and PMs he was sending out.and confirmed by Marcin Kleczynski (Malwarebytes President and CEO):
I can't say anything more official yet as all people who could give a more official statement right now are not available. You will have to wait until it's day in Austria/Germany (it's 02:40 AM right now)."
"I spoke with the CEO of Emsisoft regarding this situation. Christian confirmed it was an employee of Emsisoft and he has dealt with him properly. I thank Christian for his efforts."
"This month we are releasing six bulletins. Three of those affect Windows and are rated Critical. All three of those also have an Exploitability Index rating of “1” which means that we believe that consistent exploit code in the wild is highly likely within the first 30 days. In fact, as we discussed in the advance notification blog post last week, two of those are under active attack and were discussed in security advisories which are being replaced with the release of these bulletins."You may also want to watch the video presentation by Jerry Bryant and Adrian Stone at the MSRC Blog where they provide a little more discussion on risk and impact concerning this month’s bulletins and Security Advisory 973472.
Vulnerability Impact: Remote Code ExecutionMS09-029 - Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution (961371)
Restart Requirement: May require restart
Affected Software: Microsoft Windows 2000, Windows XP, Windows Server 2003
Vulnerability Impact: Remote Code ExecutionMS09-032 - Cumulative Security Update of ActiveX Kill Bits (973346)
Restart Requirement: Requires restart
Affected Software: Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008
Vulnerability Impact: Remote Code ExecutionImportant:
Restart Requirement: May require restart
Affected Software: Microsoft Windows XP, Windows Server 2003
Vulnerability Impact: Remote Code ExecutionMS09-031 - Vulnerability in Microsoft ISA Server 2006 Could Cause Elevation of Privilege (970953)
Restart Requirement: May require restart
Affected Software: Microsoft Office Publisher 2007
Vulnerability Impact: Elevation of PrivilegeMS09-033 - Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege (969856)
Restart Requirement: Requires restart
Affected Software: Microsoft Internet Security and Acceleration Server 2006
Vulnerability Impact: Elevation of Privilege
Restart Requirement: Requires restart
Affected Software: Virtual PC 2004, Virtual PC 2007, Virtual Server 2005
VISITOR ANALYSIS | |
Referring Link | http://forums.comodo.com/empty-t42573.0.html;msg288724;topicseen |
"And its been over a week and she still hasn't put my response to her post on her site Surprise Surprise!Since the only comments I reject are spam links or comments containing vulgarities, I proceeded to check the Dashboard. A screen copy of the Dashboard notice of comments that were awaiting moderation at Security Garden is too wide to incorporate here. The image is available at http://securitygarden.googlepages.com/MelihCommentNotices.GIF
http://securitygarden.blogspot.com/2009/07/parents-beware-of-comodo-firewall.html
I responded to her site on July 4th... and knowing the possibility of them censoring my post, i took a snapshot of my screen as I posted it.....7 days on... they rather censor what their users read...welldone Donna! Somehow I had a hunch that being concerned about telling the truth to her readers wasn't the first thing in her mind
Today its 11th July, they still continue to spread the lies and haven't changed a thing...
Your sole purpose is a witchhunt against Comodo.. I hope you are being paid well for that
Melih"
"1.5.The Toolbar and the Services are not intended for use by or availability to persons under the age of 18.IF YOU ARE UNDER 18 YEARS OF AGE, YOU MAY NOT DOWNLOAD, INSTALL OR USE THE TOOLBAR AND YOU MAY NOT ACCESS THE SERVICES."With such a warning, I have no other choice but to believe that use of the toolbar would provide "adult-only" results in searches.
Domain | Type | Class | TTL | Answer |
---|---|---|---|---|
www.hopsurf.com. | A | IN | 3600 | 91.199.212.173 |
hopsurf.com. | NS | IN | 3600 | ns0.comododns.net. |
hopsurf.com. | NS | IN | 3600 | ns0.comododns.com. |
hopsurf.com. | NS | IN | 3600 | ns1.comododns.com. |
hopsurf.com. | NS | IN | 3600 | ns1.comododns.net. |
ns0.comododns.com. | A | IN | 21600 | 91.209.196.4 |
ns0.comododns.net. | A | IN | 21600 | 149.5.128.4 |
ns1.comododns.com. | A | IN | 21600 | 67.51.175.4 |
ns1.comododns.net. | A | IN | 21600 | 91.209.196.5 |
Anonymous
to me Anonymous has left a new comment on your post "Parents Beware of Comodo Firewall":
HopSurf is a Comodo product, developed and published solely by Comodo, not ASk.com.
Please get you facts straight before posting what could be considered and is False information.
Publishthis comment.
Rejectthis comment.
Moderatecomments for this blog.
Posted by Anonymous to Security Gardenat July 11, 2009 11:29 PM
Reply Forward Reply|
Anonymous
to me show details 11:32 PM (10 hours ago)
Reply Please note - failure to publish any posted comments that are contrary to your posts is proof you are completely biased and therefore unreliable. People should be made aware of this fact.
Posted by Anonymous to Security Gardenat July 11, 2009 11:32 PM
Reply Forward
I believe it needs repeating: unless Windows Update (or Automatic Updates) is disabled, regardless of your settings, the upgrade will be downloaded and installed automatically.
- The Windows Update or Automatic Updates client software must be updated, or you may not be able to successfully check for updates or perform other configured actions.
- If Windows Update or Automatic Updates is enabled to automatically check for updates, download updates, or install updates on your computer then the infrastructure update will be downloaded and installed automatically.
- Your computer will not be updated if you have disabled Windows Update (or Automatic Updates) and do not check for updates.
"CA Internet Security Suite users should restore affected files from quarantine using the GUI. CA Threat Manager customers should search local hard drives for files with the extension .AVB and manually rename to their original file extension by removing the appended text on the original file name."
"Here again we find another bogus Antispyware program that does nothing but take your money ... with a little help from Comodo"Read about it at Comodo continues to damage it's reputation.
"First, we will be addressing the issue discussed in Security Advisory 971778 concerning a vulnerability in DirectShow. As noted in the advisory, we are aware of limited active attacks and we have been working aggressively to get a quality update shipped to customers.Bulletin ID: Windows 1
Second, our engineering teams have been working around the clock to produce an update for the issue discussed in Security Advisory 972890 (vulnerability in the Microsoft Video ActiveX Control) and we believe that they will be able to release an update of appropriate quality for broad distribution that protects against the attacks we detailed in the advisory and in an MSRC blog post by Christopher Budd. In the mean time, we encourage customers to continue to enable the workaround by running the “Microsoft Fix it” solution in the associated knowledge base article (KB972890)."
Maximum Severity Rating: CriticalBulletin ID: Windows 2
Vulnerability Impact: Remote Code Execution
Restart Requirement: May require restart
Affected Software: Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008
Maximum Severity Rating: CriticalBulletin ID: Windows 3
Vulnerability Impact: Remote Code Execution
Restart Requirement: May require restart
Affected Software: Microsoft Windows 2000, Windows XP, Windows Server 2003
Maximum Severity Rating: CriticalBulletin ID: VPC/VS
Vulnerability Impact: Remote Code Execution
Restart Requirement: May require restart
Affected Software: Microsoft Windows XP, Windows Server 2003
Maximum Severity Rating: ImportantBulletin ID: ISA
Vulnerability Impact: Elevation of Privilege
Restart Requirement: Requires restart
Affected Software: Virtual PC 2004, Virtual PC 2007, Virtual Server 2005
Maximum Severity Rating: ImportantBulletin ID: Publisher
Vulnerability Impact: Elevation of Privilege
Restart Requirement: Requires restart
Affected Software: Microsoft Internet Security and Acceleration Server 2006
Maximum Severity Rating: ImportantAlthough Microsoft does not anticipate any changes, the number of bulletins, products affected, restart information, and severity of the bulletins are subject to change until released.
Vulnerability Impact: Remote Code Execution
Restart Requirement: May require restart
Affected Software: Microsoft Office Publisher 2007
http://twitter.com/adCenterBlog
http://twitter.com/AskTechNetUK
http://twitter.com/Azure
http://twitter.com/bing
http://twitter.com/bingcashback
http://twitter.com/bizspark
http://twitter.com/ch10
http://twitter.com/ch8
http://twitter.com/ch9
http://twitter.com/codeplex
http://twitter.com/continuumshow
http://twitter.com/CRMOnline
http://twitter.com/fixit4me
http://twitter.com/HealthVault
http://twitter.com/IE
http://twitter.com/live_at_edu
http://twitter.com/liveframework
http://twitter.com/livemesh
http://twitter.com/liveside
http://twitter.com/MBSConvergence
http://twitter.com/Microsoft
http://twitter.com/Microsoft_EDU
http://twitter.com/microsoft_green
http://twitter.com/microsoft_xbox
http://twitter.com/MicrosoftCES
http://twitter.com/microsofthohm
http://twitter.com/MicrosoftIW
http://twitter.com/MicrosoftPress
http://twitter.com/MicrosoftSB
http://twitter.com/MicrosoftStore
http://twitter.com/microsofttag
http://twitter.com/MicrosoftUP
http://twitter.com/microsoftvine
http://twitter.com/MicrosoftVSTS
http://twitter.com/microspotting
http://twitter.com/MicrsftTech4All
http://twitter.com/mixonline
http://twitter.com/msaccess
http://twitter.com/msadvertising
http://twitter.com/MSDN
http://twitter.com/MSDN_News
http://twitter.com/MSDN_Office
http://twitter.com/MSDynamicsCRM
http://twitter.com/MSExpression
http://twitter.com/MSExpression
http://twitter.com/MSFTBizBuilder
http://twitter.com/MSFTResearch
http://twitter.com/mslearning
http://twitter.com/msmyphone
http://twitter.com/MSOffice_ITPro
http://twitter.com/MSOfficeResKit
http://twitter.com/MSOfficeUS
http://twitter.com/msonline
http://twitter.com/msPartner
http://twitter.com/msretail
http://twitter.com/msrobotics
http://twitter.com/MSRobotics
http://twitter.com/MSSpringboard
http://twitter.com/MSSurface
http://twitter.com/mswebplatform
http://twitter.com/MSWindows
http://twitter.com/MVPAwardProgram
http://twitter.com/mvpglobalsummit
http://twitter.com/office_live
http://twitter.com/Office2010Movie
http://twitter.com/officelabs
http://twitter.com/PDC09
http://twitter.com/projectrosetta
http://twitter.com/recite
http://twitter.com/SharePoint
http://twitter.com/sharepointBI
http://twitter.com/silverlightnews
http://twitter.com/SiteNamedDesire
http://twitter.com/STBNewsBytes
http://twitter.com/teamsilverlight
http://twitter.com/tnedge
http://twitter.com/virtualization
http://twitter.com/WindowsAzure
http://twitter.com/windowsblog
http://twitter.com/windowslive
http://twitter.com/WindowsLiveWire
http://twitter.com/wlmessenger
http://twitter.com/wmdev
http://twitter.com/xamlevents
http://twitter.com/XNACommunity
http://twitter.com/zune
http://twitter.com/ZuneHD
http://twitter.com/ZuneInsider
http://twitter.com/zunemarketplace
Ed Bott, MVP, Ed Bott's Windows Expertiseand representing The Windows Club:
Lowell Heddings, HowToGeek
Howard Lo, Microsoft Regional Team Manager (APAC)
Emil Protalinski, Arstechnica
Rafael Rivera, Within Windows
Paul Schottland, Microsoft Product Unit Manager
Steven Sinchak, MVP, Tweaks
Corrine Chorney, MVP, Security Garden and The Windows Club ModeratorFollowing the selection of 10 sites from among the entrants, those sites will be submitted for a community vote. The top 5 vote recipients will be judged again, de nova, by the Panel of Judges and the Winner and the 2 Runners-up declared. While selecting the final 3, the votes received by the top 5 will not be a considering factor.
James Fisher, MVP, Windows Talk and The Windows Club Moderator
Anand Khanse, MVP, and The Windows Club Administrator
(MVP = Recipient of Microsoft Most Valuable Professional Award)
July 1: Contest AnnouncementTime Zones: 1.30 PM UTC converts to 11:30:00 PM AEST, 7.00 PM IST, 6:30:00 AM PST, same date.
July 5: Submission of entries start, 1.30 PM UTC
July 30: Last date for submitting entries, 1.30 PM UTC
August 1-8: Judges shortlist the top 10 entries
August 9: Open Community Voting, 1.30 PM UTC
August 25: Close Community Voting, 1.30 PM UTC
August 26-30: Judges Decide
August 31: Announcement of Winners
The unanimous Declaration of the thirteen united States of America
When in the Course of human events it becomes necessary for one people to dissolve the political bands which have connected them with another and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. . ."Based on the above, as well as the sneaky inclusion of the pre-checked toolbar and missing EULA in the installer, I strongly advise caution, particularly to parents who have young children using the family computer."1.5.The Toolbar and the Services are not intended for use by or availability to persons under the age of 18.IF YOU ARE UNDER 18 YEARS OF AGE, YOU MAY NOT DOWNLOAD, INSTALL OR USE THE TOOLBAR AND YOU MAY NOT ACCESS THE SERVICES."
"So Comodo’s promise to remove SafeSurf Toolbar happened but not to finish their agreement with A$k/IAC. Instead, the new version of Comodo is now bundled with HopSurf Toolbar which is IAC/Ask.com too. The installer become worst because there’s no EULA presented in addition to known method of misleading people by offering unnecessary third party service/component in a SECURITY software. Note that it is a security software that should offer clean installer no?"So much for improvements.