Security Alerts

MS17-012 - Critical: Security Update for Microsoft Windows (4013078) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker running inside a virtual machine runs a specially crafted application.
Categories: Security Alerts

MS17-007 - Critical: Cumulative Security Update for Microsoft Edge (4013071) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Categories: Security Alerts

MS17-009 - Critical: Security Update for Microsoft Windows PDF Library (4010319) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure if a user views specially crafted PDF content online or opens a specially crafted PDF document.
Categories: Security Alerts

MS17-014 - Important: Security Update for Microsoft Office (4013241) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Categories: Security Alerts

MS17-017 - Important: Security Update for Windows Kernel (4013081) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application.
Categories: Security Alerts

MS17-0113 - Critical: Security Update for Microsoft Graphics Component (4013075) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Categories: Security Alerts

MS17-018 - Important: Security Update for Windows Kernel-Mode Drivers (4013083) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Categories: Security Alerts

MS17-021 - Important: Security Update for Windows DirectShow (4010318) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow an Information Disclosure if Windows DirectShow opens specially crafted media content that is hosted on a malicious website. An attacker who successfully exploited the vulnerability could obtain information to further compromise a target system.
Categories: Security Alerts

MS17-022 - Important: Security Update for Microsoft XML Core Services (4010321) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user visits a malicious website. However, in all cases an attacker would have no way to force a user to click a specially crafted link. An attacker would have to convince a user to click the link, typically by way of an enticement in an email or Instant Messenger message.
Categories: Security Alerts

MS17-019 - Important: Security Update for Active Directory Federation Services (4010320) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves a vulnerability in Active Directory Federation Services (ADFS). The vulnerability could allow information disclosure if an attacker sends a specially crafted request to an ADFS server, allowing the attacker to read sensitive information about the target system.
Categories: Security Alerts

MS17-020 - Important: Security Update for Windows DVD Maker (3208223) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Important
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves an information disclosure vulnerability in Windows DVD Maker. The vulnerability could allow an attacker to obtain information to further compromise a target system.
Categories: Security Alerts

MS17-023 - Critical: Security Update for Adobe Flash Player (4014329) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Categories: Security Alerts

MS17-MAR - Microsoft Security Bulletin Summary for March 2017 - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Revision Note: V1.0 (March 14, 2017):
Summary: This bulletin summary lists security bulletins released for March 2017
Categories: Security Alerts

3123479 - SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0

Microsoft Comprehensive Security Alerts - Tue, 2017-03-14 10:00
Revision Note: V2.0 (March 14, 2017): Advisory rereleased to announce that the changes described in this advisory have been reverted as of November 2016. This is an informational change only.
Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program.
Categories: Security Alerts

Apache Struts2 Jakarta Multipart Parser File Upload Code Execution Vulnerability Affecting Cisco Products

Cisco Security Advisories - Fri, 2017-03-10 17:30
On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser used in Apache Struts2 that could allow an attacker to execute commands remotely on the targeted system using a crafted Content-Type header value.

This vulnerability has been assigned CVE-ID CVE-2017-5638.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170310-struts2 On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser used in Apache Struts2 that could allow an attacker to execute commands remotely on the targeted system using a crafted Content-Type header value.

This vulnerability has been assigned CVE-ID CVE-2017-5638.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170310-struts2
Security Impact Rating: Critical
CVE: CVE-2017-5638
Categories: Security Alerts

Cisco Prime Infrastructure Cross-Site Scripting Vulnerability

Cisco Security Advisories - Wed, 2017-03-01 14:00
A vulnerability in the HTTP web-based management interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected system.

The vulnerability is due to insufficient input validation of a user-supplied value. An attacker could exploit this vulnerability by convincing a user to click a specific link.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-cpi A vulnerability in the HTTP web-based management interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected system.

The vulnerability is due to insufficient input validation of a user-supplied value. An attacker could exploit this vulnerability by convincing a user to click a specific link.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-cpi
Security Impact Rating: Medium
CVE: CVE-2017-3848
Categories: Security Alerts

Cisco NetFlow Generation Appliance Stream Control Transmission Protocol Denial of Service Vulnerability

Cisco Security Advisories - Wed, 2017-03-01 14:00
A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition.

The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-nga A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition.

The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170301-nga
Security Impact Rating: High
CVE: CVE-2017-3826
Categories: Security Alerts

MS17-005 - Critical: Security Update for Adobe Flash Player (4010250) - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-02-21 10:00
Severity Rating: Critical
Revision Note: V1.0 (February 21, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Categories: Security Alerts

MS17-FEB - Microsoft Security Bulletin Summary for February 2017 - Version: 1.0

Microsoft Comprehensive Security Alerts - Tue, 2017-02-21 10:00
Revision Note: V1.0 (February 21, 2017):
Summary: This bulletin summary lists security bulletins released for February 2017
Categories: Security Alerts

Cisco Secure Access Control System Cross-Site Scripting Vulnerability

Cisco Security Advisories - Wed, 2017-02-15 14:00
A vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system.

The vulnerability is due to insufficient input validation of a user-supplied value. An attacker may be able to exploit this vulnerability by intercepting the user packets and injecting malicious code.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs A vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system.

The vulnerability is due to insufficient input validation of a user-supplied value. An attacker may be able to exploit this vulnerability by intercepting the user packets and injecting malicious code.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs
Security Impact Rating: Medium
CVE: CVE-2017-3838
Categories: Security Alerts

Pages

Subscribe to Willing Minds aggregator - Security Alerts