Anzeigen der neuesten Beiträge
0 Mitglieder und 7 Gäste betrachten dieses Thema.
Stinger Release NotesBuild Number: 11.0.0.207Build Date: 26-Mar-2013Stinger 32bit MD5: 2d4bb1c134b2d07fbabe2b37431ed87f SHA1: 51a4835e38cde2aad50b0cc1e28ecee978f05519Stinger-ePO 32bit MD5: 1ff36572ca35fcaa940bd6d7e83a5c04 SHA1: 54163b5f03605449e6c0fcae7d7164f01fbaa8bcStinger 64bit MD5: 8dfad7f6574f0f5929fcb48a2424ff12 SHA1: 0a4efd8c49f1c6b25f5f8e1f804c4bbfaaa672d2Stinger-ePO 64bit MD5: 921066e886942f9ef28f7e2b8edc6616 SHA1: 8d32c9280cd695da494a251bed8bbe369d15b281Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.Enhanced Detections:• Generic Downloader.z• Generic FakeAlert.eo• JS/Exploit-Blacole.cw• JS/Exploit-Blacole.gc• PWS-Fmocx.a• PWS-Zbot• PWS-Zbot.gen.agz• PWS-Zbot.gen.any• PWS-Zbot.gen.aov• PWS-Zbot.gen.arw• PWS-Zbot.gen.asm• W32/Autorun.worm.aaeh• W32/Autorun.worm.c• ZeroAccess
Tuesday, March 26, 2013Stable Channel UpdateThe Chrome team is excited to announce the promotion of Chrome 26 to the Stable Channel. Chrome 26.0.1410.43 for Windows, Mac, Linux, and Chrome Frame contains number of new items including: "Ask Google for suggestions" spell checking feature improvements (e.g. grammar and homonym checking) Desktop shortcuts for multiple users (profiles) on Windows Asynchronous DNS resolver on Mac and LinuxSecurity fixes and rewards:Please see the Chromium security page for more information. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix. [$1000] [172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen of OUSPG. [180909] Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google Chrome Security Team (Cris Neckar). [180555] Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit to Vsevolod Vlasov of the Chromium development community. [Linux only] [178760] Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions. Credit to Google Chrome Security Team (Mustafa Emre Acer). [177410] Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [174943] High CVE-2013-0921: Ensure isolated web sites run in their own processes. [174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to “t3553r”. [169981] [169972] [169765] Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [169632] Low CVE-2013-0924: Check an extension’s permissions API usage again file permissions. Credit to Benjamin Kalman of the Chromium development community. [168442] Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs permissions. Credit to Michael Vrable of Google. [112325] Medium CVE-2013-0926: Avoid pasting active tags in certain situations. Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c (xysec.com).A full list of changes in this build is available in the SVN revision log.
Stinger Release NotesBuild Number: 11.0.0.209Build Date: 27-Mar-2013Stinger 32bit MD5: 084d0a38922f10e5477c728b18105e4e SHA1: cf8e0d05f8711b44261580d5363f6b639d5f42abStinger-ePO 32bit MD5: b7ef8da0a1d6e1decf845fdcaf3fa5d9 SHA1: e5e1aa57dfd60528d41f0407c745b8f545332b74Stinger 64bit MD5: 5e09ef0e11ea3ca593b8cdb3ea3ce33a SHA1: 53ca8904de4f2edab3c75b05e2c27bc55975ff8cStinger-ePO 64bit MD5: 7805ceee5901850f6cb49e13b2c6554c SHA1: afe6d67c33c4cd8464f1a74558f9831946bde379 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.le• JS/Exploit-Blacole.lfEnhanced Detections:• Exploit-CVE2011-1990• False Digisig present• JS/Exploit-Blacole• JS/Exploit-Blacole.gg• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.ky• JS/Exploit-Blacole.kz• JS/Exploit-Blacole.la• JS/Exploit-Blacole.lb• JS/Exploit-Blacole.lc• JS/Exploit-Blacole.ld• PWS-Zbot.gen.any• PWS-Zbot.gen.arw• W32/Autorun.worm.g• ZeroAccess
The Dev channel has been updated to 27.0.1453.3 for Mac, Windows, Linux, and Chrome FrameFull details about what changes are in this build are available in the SVN revision log.
Stinger Release NotesBuild Number: 11.0.0.210Build Date: 28-Mar-2013Stinger 32bit MD5: 195891e6e1165d480f8753049fc11c80 SHA1: b417b70f0a9ac4c6c8a9f6383bbf893999395349Stinger-ePO 32bit MD5: 052024534a528eb6c1799ade284fea21 SHA1: 652324348a7b40390d31f47a0d487cc0dc33c8fbStinger 64bit MD5: b3cac4336f4e3b36d38ee3ef0ace4fb9 SHA1: 7ab7cb6575065c23b47066cc5134cec55c1d2cc4Stinger-ePO 64bit MD5: 28271898145a8327f5fa2917bcf878e5 SHA1: a5894ab69caf7e559a3fa6b4c8ba53de664fcea4Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• BackDoor-EJG• JS/Exploit-Blacole.lj• ZeroAccess.igEnhanced Detections:• BackDoor-EJG• JS/Exploit-Blacole.eu• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.kf• JS/Exploit-Blacole.kz• JS/Exploit-Blacole.la• JS/Exploit-Blacole.lb• JS/Exploit-Blacole.lc• JS/Exploit-Blacole.ld• JS/Exploit-Blacole.le• JS/Exploit-Blacole.lf• PWS-Fmocx.b• PWS-OnlineGames.lj• PWS-Zbot.gen.any• PWS-Zbot.gen.arw• PWS-Zbot.gen.ary• TDSS.ap• ZeroAccess• ZeroAccess.dr• ZeroAccess.hr