Anzeigen der neuesten Beiträge
0 Mitglieder und 4 Gäste betrachten dieses Thema.
Stinger Release NotesBuild Number: 10.2.0.996Build Date: 21-Feb-2013Stinger 32bit MD5: 822EC4AD672EF9CE35191E535CF498A5 SHA1: EDD4FD0F21FE4818959476DE3BBD07EC7297FCEEStinger-ePO 32bit MD5: a201167096441a46dfeb47e8b45c7337 SHA1: 57ee47c8d6b6894ae27acf9a75ed2bf0526e8541Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.kfEnhanced Detections:• Exploit-CVE2012-0507• FakeAlert-SecurityTool• FakeAlert-SysDef.ay• Generic Downloader.z• Generic FakeAlert• PWS-Zbot.gen.apc• PWS-Zbot.gen.atx• W32/Autorun.worm.aaeh• ZeroAccess.hr
The Chrome team is excited to announce the promotion of Chrome 25 to the Stable Channel. Chrome 25.0.1364.97 for Windows and Linux, and 25.0.1364.99 for Mac contain a number of new items including: Improvements in managing and securing your extensions Better support for HTML5 time/date inputs Javascript speech API support Better WebGL error handling And lots of other features for developersSecurity fixes and rewards:Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix. [$1000] [172243] High CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen of OUSPG. [$1000] [171951] High CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva. [$500] [167069] Medium CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. [$500] [165432] High CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to Renata Hodovan. [$500] [142169] Medium CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG. [172984] Low CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security Team (Chris Evans). [172369] Medium CVE-2013-0885: Too many API permissions granted to web store. [Mac only] [171569] Medium CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the Chromium development community. [171065] [170836] Low CVE-2013-0887: Developer tools process has too many permissions and places too much trust in the connected server. [170666] Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno). [170569] Low CVE-2013-0889: Tighten user gesture check for dangerous file downloads. [169973] [169966] High CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). [169685] High CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome Security Team (Jüri Aedla). [169295] [168710] [166493] [165836] [165747] [164958] [164946] Medium CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). [168570] Medium CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of the Chromium development community. [168473] High CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome Security Team (Inferno). [Linux / Mac] [167840] High CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome Security Team (Jüri Aedla). [166708] High CVE-2013-0896: Memory management issues in plug-in message handling. Credit to Google Chrome Security Team (Cris Neckar). [165537] Low CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team. [164643] High CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of the Chromium development community. [160480] Low CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome Security Team (Jüri Aedla). [152442] Medium CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team (Inferno).We’ve also resolved a high severity security issue by disabling MathML in this release. The WebKit MathML implementation isn’t quite ready for prime time yet but we are excited to enable it again in a future release once the security issues have been addressed.Many of the above bugs were detected using AddressSanitizer.We’d also like to thank Christian Holler, miaubiz and Atte Kettunen for working with us during the development cycle and preventing security regressions from ever reaching the stable channel. Rewards were issued.A full list of changes in this build is available in the SVN revision log.
Stinger Release NotesBuild Number: 10.2.0.997Build Date: 22-Feb-2013Stinger 32bit MD5: 3335474786C55CD343AF11E151455D42 SHA1: D30320E4636745082E74CC68901C7DFA4E0233E9Stinger-ePO 32bit MD5: f80915e5251d236cadbaf03e90f75967 SHA1: 1ba7ee36d57340dc93a69c23f9894005710cb9cfEnhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.Enhanced Detections:• Exploit-CVE2012-0158!rtf• Generic Downloader.z• Generic FakeAlert• JS/Exploit-Blacole.gq• Vundo• W32/Autorun.worm.aaeh
Stinger Release NotesBuild Number: 10.2.0.998Build Date: 25-Feb-2013Stinger 32bit MD5: D487D7A917CEA7C810DA4B997E215400 SHA1: EC01CFCA00E8D253CAA18BF850D0D7FE9151AE41Stinger-ePO 32bit MD5: bcfc1d72401a09b02c8cf674cb7f784f SHA1: b6f20f3c033b5982dafa7124cabe9584ae7ca89eEnhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• FakeAlert-FHG• FakeAlert-FHR• JS/Exploit-Blacole.kg• JS/Exploit-Blacole.kh• JS/Exploit-Blacole.ki• JS/Exploit-Blacole.kj• ZeroAccess.ie• ZeroAccess.ifEnhanced Detections:• Exploit-CVE2012-0158.h!rtf• Exploit-PDF• Exploit-PDF.b• FakeAlert-SysDef.ay• Generic Downloader.z• Generic FakeAlert• Generic FakeAlert.dj• Generic FakeAlert.t• Generic MSIL.a• JS/Exploit-Blacole.eq• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.ix• JS/Exploit-Blacole.ju• JS/Exploit-Blacole.ke• PWS-Zbot.gen.ary• PWS-Zbot.gen.asv• W32/Autorun.worm.aaeh• W32/Autorun.worm.g• ZeroAccess• ZeroAccess.cj• ZeroAccess.hr