Anzeigen der neuesten Beiträge
0 Mitglieder und 4 Gäste betrachten dieses Thema.
Build Number: 12.0.0.496Build Date: 20-Aug-2013Stinger 32bit MD5: 6e436b378e01f7de2481a6f3ba004b08 SHA1: dba25bd9615352483154131b94d58ca597e50f97Stinger-ePO 32bit MD5: 1b4a0e3e85b5c3f42312ae2697d229d6 SHA1: 40f1c9c3a5c8da56df9ece3782ff6a8ccc4f9bfdStinger 64bit MD5: e30c90ac48a0937aee2e5f7b638e0344 SHA1: 9465dd5534e9fbfabd035dc15b66a9ab789650e3Stinger-ePO 64bit MD5: 6ab4a3d0bdb2fae03668496d8b20b750 SHA1: 8cda4be2e0fcf062c943a22ba94426817421178f Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• Adware-InstallQEnhanced Detections:• FakeAlert-SecurityTool• Generic Downloader.z• Medfos.e• ZeroAccess.eh• ZeroAccess.ia
The Dev Channel has been updated to 30.0.1599.14 for Windows, Mac, Chrome Frame and Linux.This release fixes a number of crashes and other bugs. A full list of changes is available in the SVN log.
The Chrome team is excited to announce the promotion of Chrome 29 to the Stable channel for Windows, Mac, Linux and Chrome Frame. Chrome 29.0.1547.57 contains a number of fixes and improvments, including: Improved Omnibox suggestions based on the recency sites you have visited Ability to reset your profile back to its original state Many new apps and extensions APIs Lots of stability and performance improvementsSecurity Fixes and RewardsNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. This commonly occurs if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.This update includes 25 security fixes. Below, we highlight some fixes that were either contributed by external researchers or particularly interesting. Please see the Chromium security page for more information. [$1337] [181617] High CVE-2013-2900: Incomplete path sanitization in file handling. Credit to Krystian Bigaj. [$500] [254159] Low CVE-2013-2905: Information leak via overly broad permissions on shared memory files. Credit to Christian Jaeger. [$1337] [257363] High CVE-2013-2901: Integer overflow in ANGLE. Credit to Alex Chapman. [$1000] [260105] High CVE-2013-2902: Use after free in XSLT. Credit to cloudfuzzer. [$1000] [260156] High CVE-2013-2903: Use after free in media element. Credit to cloudfuzzer. [$1000] [260428] High CVE-2013-2904: Use after free in document parsing. Credit to cloudfuzzer.In addition, our ongoing internal security work was as usual responsible for a wide range of fixes: [274602] CVE-2013-2887: Various fixes from internal audits, fuzzing and other initiatives (Chrome 29).A partial list of changes is available in the SVN log.
Build Number: 12.0.0.498Build Date: 22-Aug-2013Stinger 32bit MD5: d4091d39c8b3cb9494e9d7347e1c4b77 SHA1: 47986cce0d3064c47a48ccad069772f0f0742348Stinger-ePO 32bit MD5: c9c2f000f19e45b4201771e5c9925ac8 SHA1: 35e712ce091059fc188e488f3c8f6adc4aa7c33dStinger 64bit MD5: 462cee8dd6b26e11f96e0f1366baa676 SHA1: 70079b82906fbec3e6efa1e1e28047fa0ba4c4f0Stinger-ePO 64bit MD5: 4b4c31615cc377dca18e363a38d7a0da SHA1: 7651596ef3e5dac4e5cb15fb729d3a741018df81 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Blacole-Redirect.ajEnhanced Detections:• Exploit-CVE2010-2568• FakeAlert-SecurityTool.gf• FakeAlert-WinwebSecurity• Generic Downloader.z• JS/Exploit!JNLP.f• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.ko• JS/Exploit-Blacole.le• JS/Exploit-Blacole.lz• PWS-ZBot.gen.aul• PWS-Zbot• PWS-Zbot.gen.oc