Anzeigen der neuesten Beiträge
0 Mitglieder und 11 Gäste betrachten dieses Thema.
Stinger Release NotesBuild Number: 11.0.0.402Build Date: 09-Jul-2013Stinger 32bit MD5: b5854dea0964db07a9a4ae0b7f0bc12d SHA1: e739267201a28156cba152ff7f10f508e2f7661cStinger-ePO 32bit MD5: 4ffce95baa01f1e19a9e0888b056b5cd SHA1: 21c97d2d598c4a1b7d9c4de6f5213ab285ee7acbStinger 64bit MD5: 3cd5d5a693b4d23bd1992264fae99680 SHA1: cb819a8f3cc12ed1f687b5a6ffb3cb08bc8796acStinger-ePO 64bit MD5: 4680c49ba7c3d1b5f3bfc59b18890837 SHA1: 1f6a4e9165d45ccb4d34bd1c89837bb887313fe5 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.Enhanced Detections:• FakeAlert-SecurityTool• Medfos.e• PWS-ZBot.gen.auh• PWS-ZBot.gen.aui• PWS-Zbot.gen.oc• PWS-Zbot.gen.oj• VBS/Autorun.worm.k
The Dev Channel has been updated to 29.0.1547.15 for Windows, Mac, Linux and Chrome Frame. This release fixes a number of crashes, as well as other bugs. A full list of changes is available in the SVN log.
The Stable channel has been updated to 28.0.1500.71 for Windows, Macintosh and Chrome Frame platforms.Security fixes and rewards:Please see the Chromium security page for more information. (Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.)This automatic update includes security fixes. We’d like to highlight the following fixes for various reasons (crediting external researchers, issuing rewards, or highlighting particularly interesting issues): [$21,500] A special reward for Andrey Labunets for his combination of CVE-2013-2879 and CVE-2013-2868 along with some (since fixed) server-side bugs. [252216] Low CVE-2013-2867: Block pop-unders in various scenarios. [252062] High CVE-2013-2879: Confusion setting up sign-in and sync. Credit to Andrey Labunets. [252034] Medium CVE-2013-2868: Incorrect sync of NPAPI extension component. Credit to Andrey Labunets. [245153] Medium CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. Credit to Felix Groebert of Google Security Team. [$6267.4] [244746] [242762] Critical CVE-2013-2870: Use-after-free with network sockets. Credit to Collin Payne. [$3133.7] [244260] Medium CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco at INRIA Paris. [$2000] [243991] [243818] High CVE-2013-2871: Use-after-free in input handling. Credit to miaubiz. [Mac only] [242702] Low CVE-2013-2872: Possible lack of entropy in renderers. Credit to Eric Rescorla. [$1000] [241139] High CVE-2013-2873: Use-after-free in resource loading. Credit to miaubiz. [Windows + NVIDIA only] [$500] [237611] Medium CVE-2013-2874: Screen data leak with GL textures. Credit to “danguafer”. [$500] [233848] Medium CVE-2013-2875: Out-of-bounds-read in SVG. Credit to miaubiz. [229504] Medium CVE-2013-2876: Extensions permissions confusion with interstitials. Credit to Dev Akhawe. [229019] Low CVE-2013-2877: Out-of-bounds read in XML parsing. Credit to Aki Helin of OUSPG. [196636] None: Remove the “viewsource” attribute on iframes. Credit to Collin Jackson. [177197] Medium CVE-2013-2878: Out-of-bounds read in text handling. Credit to Atte Kettunen of OUSPG.In addition, our ongoing internal security work was as usual responsible for a wide range of fixes: [256985] High CVE-2013-2880: Various fixes from internal audits, fuzzing and other initiatives (Chrome 28).Full details about what changes are in this build are available in the SVN revision log.
Stinger Release NotesBuild Number: 11.0.0.405Build Date: 10-Jul-2013Stinger 32bit MD5: e9df01946d9c34b7f9178ff68ebfab37 SHA1: 1568bb167230fa11c79149df148f290a1a566670Stinger-ePO 32bit MD5: 1f1e3bf7679806ee9063d26b0e7a27b0 SHA1: e1d7d3ae363a0a7683958b26a1c37040c6667054Stinger 64bit MD5: e069521ecfc959e449b6aa5801152b48 SHA1: 94f1ed23c8cf4e5cfc630d6911f4bf3cfe95b08bStinger-ePO 64bit MD5: ed3d5d408e272149cd04a6e39d32cc21 SHA1: 2f0bafb7333b0ad914667ca58ff356eeaf386439 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• HackTool-ZBotBuilderEnhanced Detections:• FakeAlert-SecurityTool• JS/Exploit!JNLP.c• JS/Exploit-Blacole!heur• PWS-Zbot.gen.oj
Stinger Release NotesBuild Number: 11.0.0.407Build Date: 11-Jul-2013Stinger 32bit MD5: 81e10f4ebfa2fbbf9b2b9c2da9bdd352 SHA1: cc31b5533ae9afe124d6c82b0f99b98023fcce5cStinger-ePO 32bit MD5: 35f2d07dbebc235d4e0d32f5b54bc6c3 SHA1: 70339f903642c655064a374209e4bd4f0f62b31dStinger 64bit MD5: 0e894b205a9da38b86efe75ce278a1a3 SHA1: c73cdc71c119c333a77c2a69c078a670b145b851Stinger-ePO 64bit MD5: a43d8ebcce0aca72f2d898dc8f63568c SHA1: 2b9f6702af93b20dc38adeb01732322c4b5fee7b Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.Enhanced Detections:• Gapz.a• Generic Downloader.z• Generic VB.jb• JS/Exploit-Blacole!heur• PWS-Zbot.gen.oj• W64/Gapz.a• ZeroAccess!cfg• ZeroAccess.dr