Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows GDI+ Multiple Vulnerabilities( 14 October 2009 )

1. GDI+ WMF Integer Overflow VulnerabilityA remote code execution vulnerability exists in the way that GDI+ allocates buffer size when handling WMF image files. The vulnerability could allow remote code execution if a user opens a specially crafted WMF image file or browses to a Web...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4763 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows IIS FTP Service Multiple Vulnerabilities( 14 October 2009 )

1. IIS FTP Service DoS VulnerabilityA vulnerability exists in the FTP Service in Microsoft Internet Information Services (IIS) 5., Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6., and Microsoft Internet Information Services...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4602 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Memory Corruption in Indexing Service Vulnerability( 14 October 2009 )

A remote code execution vulnerability exists in the Indexing Service on Windows systems. The vulnerability is due to an ActiveX control included with the service not properly handling specifically crafted Web content. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4549 Views

RISK: Medium Risk

Medium Risk

Microsoft Office ATL ActiveX Controls Multiple Vulnerabilities( 14 October 2009 )

1. ATL Uninitialized Object VulnerabilityA remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to an issue in the ATL headers that could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized. Because...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4571 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows ATL COM Initialization Vulnerability( 14 October 2009 )

A remote code execution vulnerability exists in the Microsoft ActiveX controls listed in the FAQ section of this vulnerability, which were compiled using the vulnerable Microsoft Active Template Library described in Microsoft Security Bulletin MS09-035. An attacker could exploit the vulnerability in these controls by constructing...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4700 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows CryptoAPI Multiple Vulnerabilities( 14 October 2009 )

1. Null Truncation in X.509 Common Name VulnerabilityA spoofing vulnerability exists in the Microsoft Windows CryptoAPI component when parsing ASN.1 information from X.509 certificates. An attacker who successfully exploited this vulnerability could impersonate another user or system.2. Integer Overflow...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4696 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Multiple Vulnerabilities( 14 October 2009 )

1. Microsoft .NET Framework Pointer Verification VulnerabilityA remote code execution vulnerability exists in the Microsoft .NET Framework that could allow a malicious Microsoft .NET application to obtain a managed pointer to stack memory that is no longer used. The malicious Microsoft .NET application could...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4979 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities( 14 October 2009 )

1. Data Stream Header Corruption VulnerabilityA remote code execution vulnerability exists in the way that Internet Explorer processes data stream headers in specific situations. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability...
Last Update Date: 28 Jan 2011 Release Date: 14 Oct 2009 4619 Views

RISK: Medium Risk

Medium Risk

Adobe Reader and Acrobat Multiple Code Execution Vulnerability

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which could be exploited by attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system. These issues are caused by memory corruptions, integer and heap...
Last Update Date: 28 Jan 2011 Release Date: 12 Oct 2009 4789 Views

RISK: Medium Risk

Medium Risk

CA Anti-Virus Engine RAR Heap Corruption and DoS Vulnerabilities

Two vulnerabilities have been identified in various CA products, which could be exploited by attackers or malware to cause a denial of service or compromise a vulnerable system.1. A heap corruption error in the Anti-Virus engine arclib component when processing malformed RAR archives, ...
Last Update Date: 28 Jan 2011 Release Date: 12 Oct 2009 4934 Views