Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 


Three new security bulletins - 13 July 2005

Three new security bulletins - 13 July 2005

Today, Microsoft issued three new security bulletins. Symantec Security response identified the following two vulnerabilities to be the most serious.

Buffer Overflow in Microsoft Colour Management Module

Microsoft has announced a security patch for a vulnerability within the Microsoft Colour Management Module (CMM), a component included within most Windows systems. CMM processes image files for a wide variety of formats including JPEG, EXIF, TIFF, PNG, PDF, PICT, PostScript, JDF (Job Definition Format), SVG, and CSS3. This vulnerability may be exploited remotely through malicious web sites or emails. It may be possible to exploit Outlook users by just previewing the email. Other applications that use CMM could be vulnerable as well, including Internet Explorer and MSN Messenger. Symantec Security Response has rated this threat as critical.

Microsoft Internet Explorer Javaprxy.DLL COM Object Heap Overflow

Microsoft has also introduced a security patch for a vulnerability in Javaprxy.dll, an interface to a debugger in the Microsoft Java Virtual Machine. An attacker could exploit this vulnerability through malicious web pages and run code on the local system resulting in complete control of the affected computer. Symantec Security Response has rated this threat as critical.

"While these are high-risk vulnerabilities, there are many steps users can take to protect themselves," said Oliver Friedrichs, senior manager, Symantec Security Response. "In addition to applying patches immediately, users should never open files or click on links from unknown sources. Computer users should keep software running with the least privileges possible and deploy network intrusion detection systems to monitor network traffic for signs of suspicious activity."

Symantec recommends the following actions for enterprises: · Evaluate the possible impact of these vulnerabilities to their critical systems. · Plan for required responses including patch deployment and implementation of security best practices using the appropriate security solutions. · Take proactive steps to protect the integrity of networks and information. · Verify that appropriate data backup processes and safeguards are in place and effective. · Remind users to exercise caution in opening all unknown or unexpected email attachments and in following web links from unknown or unverified sources.

Symantec recommends the following actions for consumers: · Regularly run Windows Update and install the latest security updates to keep software up to date. · Avoid opening unknown or unexpected email attachments or following web links from unknown or unverified sources. · Consider using an internet security solution such as Norton Internet Security 2005 AntiSpyware Edition to protect against today's known and tomorrow's unknown threats.

Additional information can be found at: http://www.microsoft.com/technet/security/bulletin/ms05-jul.mspx

Symantec’s security experts will closely monitor further information related to these vulnerabilities and will provide updates and security content as necessary.

ENDS

© Scoop Media

 
 
 
 
 
Business Headlines | Sci-Tech Headlines

 

Gordon Campbell: On Tiwai Point (And Saying “No” In Greece)

Its hard to see how Rio Tinto’s one month delay in announcing its intentions about the Tiwai Point aluminium smelter is a good sign for (a) the jobs of the workers affected or (b) for the New Zealand taxpayer. More>>

ALSO:

Half Empty: Dairy Product Prices Extend Slide To Six-Year Low

Dairy product prices continued their slide, paced by whole milk power, in the latest GlobalDairyTrade auction, weakening to the lowest level in six years. More>>

ALSO:

Copper Broadband: Regulator Set To Keep Chorus Pricing Largely Unchanged

The Commerce Commission looks likely to settle on a price close to its original decision on what telecommunications network operator Chorus can charge its customers, though it probably won’t backdate any update. More>>

ALSO:

Lower Levy For Safer Cars: ACC Backtracks On Safety Assessments

Dog and Lemon: “The ACC has based the entire levy system on a set of badly flawed data from Monash University. This Monash data is riddled with errors and false assumptions; that’s the real reason for the multiple mistakes in setting ACC levies.” More>>

ALSO:

Fast Track: TPP Negotiations Set To Accelerate, Groser Says

Negotiations for the Trans-Pacific Partnership will accelerate in July, with New Zealand officials working to stitch up a deal by the month's end, according to Trade Minister Tim Groser. More>>

ALSO:

Floods: Initial Assessment Of Economic Impact

Authorities around the region have compiled an initial impact assessment for the Ministry of Civil Defence, putting the estimated cost of flood recovery at around $120 million... this early estimate includes social, built, and economic costs to business, but doesn’t include costs to the rural sector. More>>

ALSO:

Get More From Scoop

 
 
 
 
 
 
 
 
 
Sci-Tech
Search Scoop  
 
 
Powered by Vodafone
NZ independent news