WEEKEND VULNERABILITY AND PATCH
REPORT
November 11, 2012
The following software
vulnerabilities and updates were announced last week.
Citadel Information Group strongly recommends that
readers update their computers and take other action as indicated. This is from an e-mail received from Stan
Stahl, Ph.D. [www.citadel-information.com].
IMPORTANT
SECURITY UPDATES
Adobe Flash Player and AIR: Adobe has released a
critical security update for its Flash Player and Adobe AIR software that
patches at least seven dangerous vulnerabilities in these products. Updates are
available for Windows, Mac, Linux and Android systems. The appropriate version
for your system can be downloaded from Adobe's Flash Player Distribution page. Most users can find out
what version of Flash they have installed by visiting this
link.
Apple QuickTime 7.7.3 (1680.64): Apple has updated
QuickTime to patch at least 9 vulnerabilities, many of them highly critical.
Updates are available through the QuickTime program.
MacBook Air and MacBook Pro Update 2.0: Apple has updated
these programs. Updates are available from Apple's Download Site.
Firefox 16.0.2: Firefox has updated
Firefox to 16.0.2. The update is available from within the program.
Google Chrome 23.0.1271.64: Google has released
Google Chrome 23.0.1271.64 to address over 20 vulnerabilities, many of them
highly critical. Updates are available through the program.
Opera 12.10: Opera has released
version 12.10 to patch at least five security vulnerabilities, many of them
highly critical. Updates are available through the program.
Microsoft Windows Flash Player: Microsoft has released
an update for Windows 8 that patches a critical vulnerability in the Flash
Player embedded within Internet Explorer 10.
CURRENT
SOFTWARE VERSIONS
Adobe Flash 11.5.502.110 [Windows, Macintosh]
Adobe Flash 11.2.202.251 [Linux]
Adobe Reader 11.0 [Warning; see below]
Apple QuickTime 7.7.3 [1680.64]
Apple Safari 5.1.7 [Windows, See warning below]
Apple Safari 6.0.2 [Mac OS X]
Firefox 16.0.2 [Windows]
Google Chrome 23.0.1271.64
Internet Explorer 9.0.8112.16421
Java SE 7 Update 09 [Citadel recommends removing or disabling Java
from your browser. Java is a major source of cyber criminal exploits. It is not
needed for most internet browsing. If you have particular web sites that
requires Java, Citadel recommends using a two-browser approach to minimize
risk. If you normally browse the Web with Firefox, for example, disable the
Java plugin in Firefox and use an alternative browser - such as Chrome, IE9,
Safari, etc - with Java enabled to browse only the sites that requires it.]
NEWLY ANNOUNCED UNPATCHED VULNERABILITIES
None.
FOR YOUR IT DEPARTMENT
Cisco Secure Access Control Systems (ACS): US-CERT reports that Cisco Secure Access Control
Systems (ACS) contains a vulnerability that could allow an unauthenticated,
remote attacker to bypass the TACACS+ based authentication service offered by
the product. US-CERT encourages users and administrators to review the Cisco Security Advisory 20121107-ACS and follow
best practice security policies to determine if their organization is affected
and the appropriate response.
Cisco IronPort Web / Email Security
Appliance Sophos Anti-Virus Multiple Vulnerabilities: Secunia reports unpatched highly critical
vulnerability in this Cisco product.
McAfee Email and Web Security Appliance: Secunia reports a vulnerability in McAfee Email
and Web Security Appliance 5.x. No patch is available at this time.
UNPATCHED VULNERABILITIES
Android Browser: Secunia reports a less critical vulnerability in the Android
browser that can be exploited to trick a user into believing he is connected to
a trusted site by including the trusted site in an iframe. The
vulnerability is confirmed in Browser version 2.3.3 included in Android version
2.3.3 and Browser version 3.2 included in Android version 3.2. Other versions
may also be affected. Users are cautioned to not rely on displayed certificate
information. We first alerted readers to this vulnerability in Weekend Vulnerability and Patch Report, December 25,
2011.
Symantec pcAnywhere:As we reported in our Cyber Security News of the Week, January 29, 2012,
Symantec has confirmed that the hacker group Anonymous stole source code from
the 2006 versions of several Norton security products and the pcAnywhere remote
access tool. Symantec has advised users to disable pcAnywhere because of the
theft of the pcAnywhere source code.
ACD Systems: Citadel recommends users remove all
ACD Systems programs from their computers. ACD Systems has failed to patch
significant critical vulnerabilities in their programs dating back more than a
year. Consequently Citadel recommends users remove all ACD Systems programs
from their computers until the company fixes these vulnerabilities and pays
proper attention to the implications of their security vulnerabilities in
opening doors to cyber criminals . The community cannot tolerate a
head-in-the-sand attitude, whether by developers or the people who purchase and
use their programs. The consequences of willful ignorance are too grave.
- ACD Systems Canvas: Secunia reports at least 13 highly critical unpatched vulnerabilities
in ACD Systems Canvas version 14. See Weekend Vulnerability and Patch Report, August
5, 2012.
- ACDSee 14.x: Secunia reports a highly critical unpatched vulnerability in
ACDSee. See Weekend Vulnerability and Patch Report, February
19, 2012.
- ACDSee Photo: Several highly critical
unpatched vulnerabilities have been identified in various ACDSee photo
products. Vulnerabilities have been identified in FotoSlate, Photo Editor 2008, and Picture Frame Manager. See Weekend Vulnerability and Patch Report, June
12, 2011. See also Weekend Vulnerability and Patch Report,
September 18, 2011 where we alerted readers to a second vulnerability
in FotoSlate.
- ACD Systems Canvas CorelDRAW: A highly critical unpatched vulnerability has
been found in ACD Systems Canvas which can be exploited by malicious
people to compromise a user's system.. See Weekend Vulnerability and Patch Report, July
31, 2011.
If you are responsible for the security of your computer, our
weekly report is for you. We strongly urge you to take action to keep your
workstation patched and updated.
If someone else is responsible for the security of your computer, forward
our Weekend Vulnerability and Patch Report to them and follow up to make sure
your computer has been patched and updated.
Vulnerability management is a key element of cyber security management.
Cyber criminals take over user computers by writing computer programs that
"exploit" vulnerabilities in operating systems (Windows, Apple OS,
etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When
software companies find a vulnerability, they usually issue an update patch to
fix the code running in their customer's computers.
Citadel publishes our Weekend Vulnerability and Patch
Report to alert readers to some of the week's important updates and
vulnerabilities. Our focus is on software typically found in the small or home
office (SOHO) or that users are likely to have on their home computer. The
report is not intended to be a thorough listing of updates and vulnerabilities.