Tuesday, November 17, 2015

Pale Moon Version 25.8.0 Released

Pale Moon

Pale Moon has been updated to version 25.8.0.  The update is described as a security, stability and usability update.

Three of the security updates are identified as DiD, "Defense-in-Depth".  These fixes do not apply to actively exploitable vulnerabilities in Pale Moon.  Rather, the purpose of the updates is to prevent future vulnerabilities caused by the same code when surrounding code changes, exposing the problem.

Security fixes:

  • Updated the libpng library to 1.5.24 to address critical security issues CVE-2015-7981 and CVE-2015-8126
  • Updated the NSPR library to 4.10.10 to address several security issues.
  • Updated the NSS library to 3.19.4 to address several security issues.
  • Fixed a memory safety hazard in SVG path code (CVE-2015-7199).
  • Fixed an issue with IP address parsing potentially allowing an attacker to bypass the Same Origin Policy (CVE-2015-7188).
  • Fixed an Add-on SDK (Jetpack) issue that would allow scripts to be executed despite being forbidden (CVE-2015-7187).
  • Fixed a crash due to a buffer underflow in libjar (CVE-2015-7194).
  • Fixed an issue for Android full screen that would potentially allow address spoofing (CVE-2015-7185).
  • Added size checks in canvas manipulations to avoid potential image encoding vulnerabilities like CVE-2015-7189. DiD
  • Fixed potential information disclosure vulnerabilities through the NTLM authentication mechanism. Insecure NTLM v1 is now disabled by default, and the workstation name is set to WORKSTATION by default (configurable with a preference for environments where identification of workstations is done by actual reported machine name). This avoids issues like CVE-2015-4515.
  • Fixed a potentially vulnerable crash from a spinning event loop during resize painting. DiD
  • Fixed several Javascript-based memory safety hazards. DiD
For information on included fixes/changes, see the Release Notes.

Minimum system Requirements (Windows):
  • Windows Vista/Windows 7/Windows 8/Server 2008 or later
  • A processor with SSE2 support
  • 256 MB of free RAM (512 MB or more recommended)
  • At least 150 MB of free (uncompressed) disk space
Pale Moon includes both 32- and 64-bit versions for Windows:
Other versions:


    To get the update now, select "Help" from the Pale Moon menu at the upper left of the browser window.  Select About Pale Moon > Check for Updates.

    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...

    Friday, November 13, 2015

    Important Information for Microsoft Outlook 2003, 2007 and 2010 Users

    Outlook.comThe Microsoft Outlook team is notifying users via email about upcoming changes that will result in the inability to access email from @outlook.com, @hotmail, @live or @msn email accounts in Microsoft Outlook 2003, 2007 and 2010.

    Although I may be completely wrong, the notification implies to me that the Outlook.com Preview is ending and the final changes outlined by the Outlook team in May (New ways to get more done in Outlook.com) will be rolling out .

    Regardless, after the changes have been made and email is no longer appearing in the Outlook client, users of Microsoft Outlook 2003, 2007 or 2010 will need to follow the steps documented in the email from the Outlook team, copied below, in order to to resume receiving email from those accounts.

    Update 12DEC2015:  The links below now yield "Internal Server Error".  Fortunately, fellow Microsoft MVP Noel Burgess pointed me to another MVP's website which includes the needed information.  See Diane Poremsky's article, Outlook.com Migration Status.

    In the next few weeks we’ll be making some updates that will impact your @outlook.com, @hotmail, @live, or @msn email account. Those changes will prevent your email from getting delivered to the Outlook desktop application you use. When you notice that you stop receiving messages, simply follow these two steps:
    For Outlook 2003 customers:
    1. Remove your email account from your Outlook 2003 desktop application
    2. Re-add your email account to your Outlook 2003 desktop application
    For Outlook 2007 customers:
    1. Remove your email account from your Outlook 2007 desktop application
    2. Re-add your email account to your Outlook 2007 desktop application
    For Outlook 2010 customers:
    1. Remove your email account from your Outlook 2010 desktop application
    2. Re-add your email account to your Outlook 2010 desktop application
    When the update happens, you may not be able to refer back to this email in your Outlook desktop application. We recommend bookmarking or saving the two links (remove and re-add) in steps 1 and 2 above that apply to the version of Outlook you’re using. Remember, you can always access this message by logging into your account at www.outlook.com at any time.
    If you don’t know what version of Outlook you have, you can click here for instructions to find out.
    Thanks for your understanding and continued use.
    The Outlook team"

    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...

    Tuesday, November 10, 2015

    Lest We Forget

    Whether you call it Veteran's Day, Armistice Day or Remembrance Day, November 11th is a time to put aside politics and pay tribute to all who died for their country.  It is also a perfect time to thank the Veterans in whatever country you live in. 

    As in previous years, I am republishing my friend Canuk's last tribute and, once again, adding a special thank you to my friends "Phantom Phixer" and "Ghost".

    The comment Canuk posted provides one example of why he was a special person:
    "I too "will remember your friends who never had a full life", while thanking you and your comrades who have served with pride, honesty and honour.

    Despite anyone's thoughts of the current conflict in Iraq - opposition or agreement, we must always remember that these brave young men and women are fighting for a cause they also may or may not agree with. The huge difference between them and us is that they are putting their lives on the line 24/7 while we sit in our homes in comfort, using the freedom of speech previous warriors won for us, and for that they deserve our love, respect, and support."

    We Shall Keep the Faith by Moira Michael, November 1918
    Oh! you who sleep in Flanders Fields, Sleep sweet - to rise anew! We caught the torch you threw And holding high, we keep the Faith With All who died. We cherish, too, the poppy red That grows on fields where valor led; It seems to signal to the skies That blood of heroes never dies, But lends a lustre to the red Of the flower that blooms above the dead In Flanders Fields. And now the Torch and Poppy Red We wear in honor of our dead. Fear not that ye have died for naught; We'll teach the lesson that ye wrought In Flanders Fields. Flags courtesy of3DFlags.com

    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...

    Adobe Flash Player and AIR Security Updates

    Adobe Flashplayer

    Adobe has released Version of Adobe Flash Player for Microsoft Windows and Macintosh.  The Extended Release Version was incremented to Version with this update.

    For those who use Adobe AIR, it has been updated to version  The update is available here: https://get.adobe.com/air/

    These updates address critical vulnerabilities that are actively being exploited. It is strongly advised that the updates be applied as soon as possible. Details of the vulnerabilities are included in the below-referenced Security Bulletin.

    Release date: November 10, 2015
    Vulnerability identifier: APSB15-28

    CVE number: CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046
    Platform: All Platforms

    • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 
    • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player
    • Users of Adobe Flash Player for Linux should update to Adobe Flash Player
    • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x and Windows 10, will automatically update to the current version.

    Flash Player Update Instructions

    It is recommended that you either use the auto-update mechanism within the product when prompted or the direct download links.  The problem with the auto-update mechanism is that it can take a few days to finally provide the update and up to a week if using the "Notify me to install updates" setting.

    Flash Player Auto-Update

    The update settings for Flash Player versions 10.3 and above can found in the Advanced tab of the Flash Player Settings Manager.  The locations are as follows:
    • Windows: click Start > Settings > Control Panel > Flash Player
    • Macintosh: System Preferences (under Other) click Flash Player
    • Linux Gnome: System > Preferences > Adobe Flash Player
    • Linux KDE: System Settings > Adobe Flash Player
    Also note that the Flash Player Settings Manager is where to manage local settings.

    Flash Player Direct Download Links

    Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras.

      • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
      • Uncheck any toolbar offered with Adobe products if not wanted.
      • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
      • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

      Verify Installation

      To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

      Do this for each browser installed on your computer.

      To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.


      Remember - "A day without laughter is a day wasted."
      May the wind sing to you and the sun rise in your heart...

      Microsoft Security Bulletin Release for November, 2015

      Microsoft released twelve (12) bulletins.  Four (4) bulletins are identified as Critical and the remaining eight (8) are rated Important in severity.

      The updates address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Office Services and Web Apps, Microsoft, Skype for Business, Microsoft .NET Framework, Microsoft Edge and Internet Explorer.

      Details about the CVEs can be found in the below-referenced TechNet Security Bulletin.  Watch for the November 2015 "monthly patch review" by Dustin Childs picking up where MSRC has left us hanging. The review can be found on the HP Security Research blog.

      • MS15-112 -- Cumulative Security Update for Internet Explorer (3104517) 
      • MS15-113 -- Cumulative Security Update for Microsoft Edge (3104519) 
      • MS15-114 -- Security Update for Windows Journal to Address Remote Code Execution (3100213)
      • MS15-115 -- Security Update for Microsoft Windows to Address Remote Code Execution (3105864)   
        • MS15-116 -- Security Update for Microsoft Office to Address Remote Code Execution (3104540) 
        • MS15-117 -- Security Update for NDIS to Address Elevation of Privilege (3101722) 
        • MS15-118 -- Security Update for .NET Framework to Address Elevation of Privilege (3104507) 
        • MS15-119 -- Security Update for Winsock to Address Elevation of Privilege (3104521) 
        • MS15-120 -- Security Update for IPSec to Address Denial of Service (3102939) 
        • MS15-121 -- Security Update for Schannel to Address Spoofing (3081320) 
        • MS15-122 -- Security Update for Kerberos to Address Security Feature Bypass (3105256) 
        • MS15-123 -- Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3105872)

        Additional Update Notes

        • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. The updated version includes detection for the the following ransomware families:  Crowti, Critroni, Teerac and Tescrypt . Details are available in the MMPC Blog Post.
        • Windows 8.x and Windows 10 -- Non-security new features and improvements for Windows 8.1 and Windows 10 are included with the updates.


          Remember - "A day without laughter is a day wasted."
          May the wind sing to you and the sun rise in your heart...

          Tuesday, November 03, 2015

          Mozilla Firefox Version 42.0 Released with Numerous Security Updates

          Mozilla sent Firefox Version 42.0 to the release channel.  The update includes three (3) critical, five (5) high, seven (7) moderate and two (2) low security updates.

          Version 38.4.0 was released for Firefox ESR.

          Fixed in Firefox 42

          • 2015-133 NSS and NSPR memory corruption issues
          • 2015-132 Mixed content WebSocket policy bypass through workers
          • 2015-131 Vulnerabilities found through code inspection
          • 2015-130 JavaScript garbage collection crash with Java applet
          • 2015-129 Certain escaped characters in host of Location-header are being treated as non-escaped
          • 2015-128 Memory corruption in libjar through zip files
          • 2015-127 CORS preflight is bypassed when non-standard Content-Type headers are received
          • 2015-126Crash when accessing HTML tables with accessibility tools on OS X
          • 2015-125 XSS attack through intents on Firefox for Android
          • 2015-124 Android intents can be used on Firefox for Android to open privileged files
          • 2015-123 Buffer overflow during image interactions in canvas
          • 2015-122 Trailing whitespace in IP address hostnames can bypass same-origin policy
          • 2015-121 Disabling scripts in Add-on SDK panels has no effect
          • 2015-120 Reading sensitive profile files through local HTML file on Android
          • 2015-119 Firefox for Android addressbar can be removed after fullscreen mode
          • 2015-118 CSP bypass due to permissive Reader mode whitelist
          • 2015-117 Information disclosure through NTLM authentication
          • 2015-116 Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)

          What’s New

          • New -- Private Browsing with Tracking Protection blocks certain Web elements that could be used to record your behavior across sites
          • New -- Control Center that contains site security and privacy controls
          • New -- Indicator added to tabs that play audio with one-click muting
          • New -- WebRTC improvements:
            • IPV6 support
            • Preferences for controlling ICE candidate generation and IP exposure
            • Hooks for extensions to allow/deny createOffer/Answer
            • Improved ability for applications to monitor and control which devices are used in getUserMedia
          • New -- Login Manager improvements:
            • Improved heuristics to save usernames and passwords
            • Edit and show all logins in line, Copy/Paste usernames/passwords from the Context menu
            • Migration imports your passwords to Firefox from Google Chrome for Windows and Internet Explorer; import anytime from the Login Manager
          • Changed -- Improved performance on interactive websites that trigger a lot of restyles
          • HTML5 -- Implemented ES6 Reflect
          • HTML5 -- Support ImageBitmap and createImageBitmap()
          • HTML5 -- Media Source Extension for HTML5 video available for all sites
          • Fixed Various security fixes

          Known Issues

          • unresolved -- URLs containing a Unicode-format Internationalized Domain Name (IDN) are not redirected properly, leading to a Server Not Found error.


          To get the update now, select "Help" from the Firefox menu at the upper left of the browser window, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.


          Remember - "A day without laughter is a day wasted."
          May the wind sing to you and the sun rise in your heart...