Adobe Security Vulnerabilities From CERT via Netiquette IQ
As I have stated numerous times in my blogs, Netiquette includes an active security and safety set of processes. With so many security breeches occurring from almost every possible source, it is critical to stay current with security issues where they effect you in a personal, professional or social way. US-Cert is one of the premiere ways to enhance your security processes. Netiquette IQ is committed to provide as much information as possible for its readers not only in online etiquette but in online security as well.
National Cyber Awareness System:
01/20/2014 06:51 AM EST
Original
release date: January 20, 2014
The US-CERT Cyber Security Bulletin provides a summary of new
vulnerabilities that have been recorded by the National
Institute of Standards and Technology (NIST) National
Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center
(NCCIC) / United States Computer Emergency Readiness Team
(US-CERT). For modified or updated entries, please visit the NVD, which contains historical
vulnerability information.The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
·
High -
Vulnerabilities will be labeled High severity if they have a CVSS base score of
7.0 - 10.0
·
Medium -
Vulnerabilities will be labeled Medium severity if they have a CVSS base score
of 4.0 - 6.9
·
Low - Vulnerabilities
will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided by organizations and
efforts sponsored by US-CERT. This information may include identifying
information, values, definitions, and related links. Patch information is
provided when available. Please note that some of the information in the bulletins
is compiled from external, open source reports and is not a direct result of
US-CERT analysis.High Vulnerabilities
Primary
Vendor -- Product |
Description
|
Published
|
CVSS Score
|
Source & Patch Info
|
adobe -- adobe_air
|
Adobe
Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on
Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before
4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler
before 4.0.0.1390 allow attackers to bypass unspecified protection mechanisms
via unknown vectors.
|
2014-01-15
|
||
adobe -- adobe_air
|
Adobe
Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on
Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before
4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler
before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by
leveraging an "address leak."
|
2014-01-15
|
||
adobe -- acrobat
|
Adobe
Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and
Mac OS X allow attackers to execute arbitrary code or cause a denial of
service (memory corruption) via unspecified vectors, a different
vulnerability than CVE-2014-0495.
|
2014-01-15
|
||
adobe -- acrobat
|
Adobe
Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and
Mac OS X allow attackers to execute arbitrary code or cause a denial of
service (memory corruption) via unspecified vectors, a different
vulnerability than CVE-2014-0493.
|
2014-01-15
|
||
adobe -- acrobat
|
Use-after-free
vulnerability in Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before
11.0.06 on Windows and Mac OS X allows attackers to execute arbitrary code
via unspecified vectors.
|
2014-01-15
|
+++++++++++++++++++++++++++++++++++++++++++++++++
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am
the president of Tabula
Rosa Systems,
a “best of breed” reseller of products for communications, email, network
management software, security products and professional services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ
rating system, Netiquette IQ, which promotes the fundamentals outlined in my
book.
Over
the past twenty-five years, I have enjoyed a dynamic and successful career and
have attained an extensive background in IT and electronic communications by
selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
If you have not already done so, please view the trailer for my book below.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home