DarkFiber Consulting – IT Managed Services

Trend Micro OfficeScan Critical Patch Release

October 22nd, 2008 . by DarkFiber Consulting

Trend Micro has released a Critical Patch to address a vulnerability in OfficeScan. This vulnerability is due to a stack-based buffer overflow condition. By sending a specially crafted HTTP request containing form data to the server CGI module, an attacker may be able to execute arbitrary code on the affected system.

DarkFiber Consulting encourages users and administrators to review Trend Micro Critical Patch Release overview for Build 1374 and Build 3110 and apply any necessary updates to help mitigate the risks.

Google Releases Chrome Version 0.2.149.29

September 9th, 2008 . by DarkFiber Consulting

Google has released Chrome version 0.2.149.29 to address multiple vulnerabilities. The four vulnerabilities are due to the following:

  1. a buffer overflow condition in the handling of filenames displayed in the “Save As” dialog
  2. a buffer overflow condition in the handling of link targets displayed in the status area when a user hovers over a link
  3. an out-of-bounds memory read error when parsing URLs ending with :%
  4. a default configuration that allows files to be downloaded to the desktop without prompting the user first

Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

Google has indicated that the fixed version is being applied to all users through automatic updates. DarkFiber Consulting encourages users to review the Chrome 0.2.149.29 release notes and upgrade if the newest version has not been automatically applied.

Exploit Code Available for CitectSCADA Vulnerability

September 9th, 2008 . by DarkFiber Consulting

In June, DarkFiber Consulting published Vulnerability Note VU#476345 to alert users of a vulnerability affecting Citect CitectSCADA. This vulnerability is due to a buffer overflow condition in the handling of ODBC requests from clients. Exploit code for this vulnerability is publicly available and exploitation may allow an attacker to execute arbitrary code.

DarkFiber Consulting encourages users to review Vulnerability Note VU#476345 and apply the patch as described in the document.