|
|
|
![]() |
|
Strumenti |
![]() |
#1 |
www.hwupgrade.it
Iscritto dal: Jul 2001
Messaggi: 75173
|
Link alla notizia: http://www.hwupgrade.it/news/sicurezza/18304.html
Da qualche giorno è stato individuato un nuovo exploit relativo a Microsoft PowerPoint Click sul link per visualizzare la notizia. |
![]() |
![]() |
![]() |
#2 |
Senior Member
Iscritto dal: Aug 2006
Città: Trieste
Messaggi: 5442
|
I love microsoft
Sono queste piccole cose che mi ricordano perche sono passato a debian.....
|
![]() |
![]() |
![]() |
#3 |
Senior Member
Iscritto dal: Dec 2005
Messaggi: 872
|
La notizia è totalmente falsa. Mai possibile che quando un sito pubblica notizie sbagliate anche voi dovete copiarle e non vi informate meglio?
La stessa Trend Micro dice che non è un 0-day exploit, ma è un nuovo trojan che colpisce una vecchia falla già risolta. E anche la Microsoft ha smentito. Trend Micro says this is not a 0-day exploit, but exploit an old flaw (MS06-012). “This Trojan is not a zero-day exploit. It attempts to exploit the Microsoft Office Remote Code Execution Using a Malformed Routing Slip Vulnerability. It is seen that this Trojan has a similarity with other malware exploiting the said Vulnerability. Note that the shell code of the sample is actually located in the routing slip record. However, the shellcode does not manifest the said behavior.” http://www.trendmicro.com/vinfo/viru...R%2EBH&VSect=T According to Stephen Toulouse, a program manager in the MSRC (Microsoft Security Response Center), the vulnerability has already been resolved by an update. "Our initial investigation is that this is not a new zero-day at all," Toulouse said in an e-mail exchange with eWEEK. Anche sul blog di securiteam c'è scritto: NOTE #2: According to the new information this is not 0-day vulnerability, it is related to patched MS06-012. Quindi BASTA FARE DISINFORMAZIONE!!! Ultima modifica di Pandrin2006 : 23-08-2006 alle 09:41. |
![]() |
![]() |
![]() |
#4 |
Member
Iscritto dal: Jun 2006
Messaggi: 149
|
sono queste piccole cose che mi ricordano perche' sono passato a mac! ah ah ah mi scompiscio dalle risate!!!! certo che microscotch e' tutto un buco!!! va che se continua cosi con tutte ste' falle tra un po' affonda!!! iua iua iua .....
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() |
![]() |
![]() |
#5 | |
Junior Member
Iscritto dal: Aug 2006
Messaggi: 2
|
Quote:
Mac OS X Multiple Vulnerabilities Critical: Highly critical Impact: Security Bypass Cross Site Scripting Exposure of system information Exposure of sensitive information Privilege escalation DoS System access Where: From remote http://secunia.com/advisories/21253/ 1) An error in the AFP server within the handling of users' search results can be exploited by malicious users to gain knowledge of the names of files and folders for which the user performing the search has no access to. Successful exploitation requires that file sharing is enabled. 2) An integer overflow error in the AFP server may be exploited by an authenticated user to execute arbitrary code with system privileges. Successful exploitation requires that file sharing is enabled. 3) An error in the AFP server where the reconnect keys for file sharing sessions are stored world-readable can be exploited by local users to access files and folders with the privileges of another user. Successful exploitation requires that file sharing is enabled. 4) An error in the AFP server caused due to an unchecked error condition can be exploited to crash the AFP server by sending a specially crafted invalid AFP request. Successful exploitation requires that file sharing is enabled. 5) An error in Bom's compression state handling may be exploited to cause a heap corruption by tricking a user into opening a specially crafted corrupted ZIP archive. Successful exploitation may allow execution of arbitrary code. NOTE: This can be exploited automatically via the Safari browser if the "Open safe files after downloading" setting is enabled. 6) A boundary error in bootpd can be exploited to cause a stack-based buffer overflow by sending a specially crafted BOOTP request. Successful exploitation may allow execution of arbitrary code with system privileges, but requires that bootpd is enabled (not enabled by default). 7) An error in the processing of dynamic linker options in privileged applications may be exploited by local users to influence the behavior of privileged applications by specifying options which causes output to standard error. 8) An error in the dynamic linker may be exploited by local users to specify paths used when loading libraries into an privileged application. Successful exploitation may allow execution of arbitrary code with escalated privileges. 9) Various errors exists in the fetchmail utility. |
|
![]() |
![]() |
![]() |
#6 | |
Junior Member
Iscritto dal: Aug 2006
Messaggi: 2
|
Quote:
Linux Kernel SCTP_Make_Abort_User Function Buffer Overflow Vulnerability 2006-08-23 http://www.securityfocus.com/bid/19666 Linux Kernel UDF Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/19562 Linux Kernel USB Driver Data Queue Local Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/19033 Linux Kernel SCTP Multiple Remote Denial of Service Vulnerabilities 2006-08-22 http://www.securityfocus.com/bid/18085 Linux Kernel SNMP NAT Helper Remote Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/18081 Linux Kernel CD-ROM Driver Local Buffer Overflow Vulnerability 2006-08-22 http://www.securityfocus.com/bid/18847 Linux Kernel PROC Filesystem Local Privilege Escalation Vulnerability 2006-08-22 http://www.securityfocus.com/bid/18992 Linux Kernel NFS and EXT3 Combination Remote Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/19396 Linux Kernel Non-Hugemem Support Local Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/19664 Linux Kernel s/io.c/IO.C Local Denial of Service Vulnerability 2006-08-22 http://www.securityfocus.com/bid/19665 Linux Kernel SG Driver Direct IO Local Denial of Service Vulnerability 2006-08-21 http://www.securityfocus.com/bid/18101 Linux Kernel PPC970 Systems Local Denial of Service Vulnerability 2006-08-21 http://www.securityfocus.com/bid/19615 Linux Kernel IPv6 FlowLable Denial Of Service Vulnerability 2006-08-15 http://www.securityfocus.com/bid/15729 Linux Kernel POSIX Timer Cleanup Handling Local Denial of Service Vulnerability 2006-08-15 http://www.securityfocus.com/bid/15722 Linux Kernel PTraced Child Auto-Reap Local Denial of Service Vulnerability 2006-08-15 http://www.securityfocus.com/bid/15625 Linux Kernel do_coredump Denial of Service Vulnerability 2006-08-15 http://www.securityfocus.com/bid/15723 Linux Kernel DM-Crypt Local Information Disclosure Vulnerability 2006-08-14 http://www.securityfocus.com/bid/16301 Linux Kernel DVB Driver Local Buffer Overflow Vulnerability 2006-08-14 http://www.securityfocus.com/bid/16142 Linux Kernel Sysctl_String Local Buffer Overflow Vulnerability 2006-08-14 http://www.securityfocus.com/bid/16141 Linux Kernel ProcFS Kernel Memory Disclosure Vulnerability 2006-08-14 http://www.securityfocus.com/bid/16284 Linux Kernel mq_open System Call Unspecified Denial of Service Vulnerability 2006-08-14 http://www.securityfocus.com/bid/16283 Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability 2006-08-14 http://www.securityfocus.com/bid/18874 Linux Kernel XT_SCTP-netfilter Remote Denial of Service Vulnerability 2006-08-14 http://www.securityfocus.com/bid/18550 Linux Kernel Netfilter Conntrack_Proto_SCTP.C Denial of Service Vulnerability 2006-08-14 http://www.securityfocus.com/bid/18755 Linux Kernel Signal_32.C Local Denial of Service Vulnerability 2006-08-14 http://www.securityfocus.com/bid/18616 Linux Kernel Intel EM64T SYSRET Local Denial of Service Vulnerability 2006-08-14 http://www.securityfocus.com/bid/17541 Linux Kernel Unspecified Socket Buffer Handling Remote Denial of Service Vulnerability 2006-08-11 http://www.securityfocus.com/bid/19475 Multiple Vendor AMD CPU Local FPU Information Disclosure Vulnerability 2006-08-11 http://www.securityfocus.com/bid/17600 Linux Kernel Multiple SCTP Remote Denial of Service Vulnerabilities 2006-08-11 http://www.securityfocus.com/bid/17955 Linux Kernel Security Key Functions Local Copy_To_User Race Vulnerability 2006-08-11 http://www.securityfocus.com/bid/17084 |
|
![]() |
![]() |
![]() |
#7 | |
Member
Iscritto dal: Jun 2006
Messaggi: 149
|
Quote:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
|
![]() |
![]() |
![]() |
#8 | |
Bannato
Iscritto dal: Apr 2001
Città: Bologna, all'ombra delle Torri
Messaggi: 6845
|
Quote:
Non sono un fan Microsoft, ma francamente se io fossi Fammi delle critiche di un "appassionato" di informatica che manco conosce l'inglese mi farei una risata. Senza offesa, eh. |
|
![]() |
![]() |
![]() |
#9 |
Senior Member
Iscritto dal: Mar 2002
Città: Agrate B.za (MB)
Messaggi: 11541
|
Se solo PowerPoint fosse usato per il suo scopo, cioè le presentazioni, non ci sarebbero problemi. Peccato che il formato preferito per fare girare monnezza (catene, foto e altre cose inutili) via mail sia proprio il .pps...
__________________
- |
![]() |
![]() |
![]() |
#10 | |
Member
Iscritto dal: Jun 2006
Messaggi: 149
|
Quote:
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
|
![]() |
![]() |
![]() |
#11 | |
Member
Iscritto dal: Jun 2006
Messaggi: 149
|
Quote:
|
|
![]() |
![]() |
![]() |
#12 | |||
Senior Member
Iscritto dal: Feb 2004
Città: Verona
Messaggi: 3392
|
Quote:
Quote:
Quote:
|
|||
![]() |
![]() |
![]() |
#13 | |
Senior Member
Iscritto dal: Mar 2005
Città: ~
Messaggi: 706
|
Quote:
![]() un bel po' di falle son state corrette, visto che ora siamo al kernel 2.6.17.10 ![]()
__________________
Ciao ciao cagnolino Billy ![]() ![]() ![]() MacMini late 2009, 2.53GHz, 4GB ram, 320GB hard disk, Snow Leopard 10.8.2 - iPod Nano 6th gen. XBOX Live GamerTag: InsaneMau |
|
![]() |
![]() |
![]() |
#14 | |
Senior Member
Iscritto dal: Dec 2004
Messaggi: 1829
|
Quote:
Chissà perchè cercar sempre la polemica MS-Linux a tutti i costi, andando pure OT... |
|
![]() |
![]() |
![]() |
#15 |
Senior Member
Iscritto dal: Jun 2001
Messaggi: 881
|
Fanboyism galore eh....
|
![]() |
![]() |
![]() |
#16 |
Senior Member
Iscritto dal: Feb 2004
Messaggi: 343
|
Non sono un esperto di sistemi operativi e sicurezza, ma non si può certo negare la sostanziale differenza tra un sistema mac e windows, lo dico perché proprio di recente sono passato alla mela. Sono consapevole che no si può mai stare tranquilli, ma con windows c'è da farsi venire i capelli bianchi, vuoi perché è più diffuso, vuoi perché deve essere compatibile con un gran numero di periferiche e hardware a differenza dei mac che sono progettati unitamente al software, vuoi perché spesso il software è scritto con i piedi..
e comunque: Apple Macintosh OS X Vendor: Apple Product Link: View here Product Affected By: 72 Secunia Advisories The Secunia database currently contains 0 Secunia advisories marked as "Unpatched", which affects Apple Macintosh OS X. This is based on the most severe Secunia advisory, which is marked as "Unpatched" in the Secunia database. Go to Unpatched/Patched list below for details. Currently, 0 out of 72 Secunia advisories, are marked as "Unpatched" in the Secunia database.
__________________
Apple iMac 4k 2017; Apple Macbook pro 15" 2015; |
![]() |
![]() |
![]() |
#17 | |
Senior Member
Iscritto dal: Sep 2002
Messaggi: 2555
|
Quote:
Forse domani ce ne saranno altre (24 agosto)... ![]() Dimmi esattamente quali sono state correte, per favore, visto che dici che sono state corrette. Grazie |
|
![]() |
![]() |
![]() |
#18 |
Member
Iscritto dal: Mar 2006
Città: Anzio
Messaggi: 217
|
La cosa più bella è continuare a scannarsi su una notizia completamente errata, visto che non è uno 0-day exploit.
Correggere la news (sia titolo che contenuto) magari sarebbe una buona idea... |
![]() |
![]() |
![]() |
#19 | |
Senior Member
Iscritto dal: Mar 2004
Città: Unknown
Messaggi: 4553
|
Quote:
La storia ci insegna che HW non corregge mai gli articoli, soprattutto se sono errati (non è di certo il primo caso).
__________________
Only dead fish swim with the stream. |
|
![]() |
![]() |
![]() |
#20 | |
Senior Member
Iscritto dal: Mar 2005
Città: ~
Messaggi: 706
|
Quote:
__________________
Ciao ciao cagnolino Billy ![]() ![]() ![]() MacMini late 2009, 2.53GHz, 4GB ram, 320GB hard disk, Snow Leopard 10.8.2 - iPod Nano 6th gen. XBOX Live GamerTag: InsaneMau |
|
![]() |
![]() |
![]() |
Strumenti | |
|
|
Tutti gli orari sono GMT +1. Ora sono le: 13:54.