New version of Opera- Opera 10.63 is a recommended upgrade offering security and stability enhancements:

October 2010 Microsoft Black Tuesday Summary

Published: 2010-10-12
Last Updated: 2011-01-24 23:29:52 UTC
by Adrien de Beaupre (Version: 2)
13 comment(s)

Overview of the October 2010 Microsoft Patches and their status.

# Affected Contra Indications Known Exploits Microsoft rating ISC rating(*)
clients servers
MS10-071 Cumulative Security Update for Internet Explorer (Replaces MS10-053 )
Internet Explorer
KB 2360131 CVE-2010-3325 and CVE-2010-3324 have been disclosed publicly. Severity:Critical
Exploitability: ?,3,3,3,1,?,1,3,1
Critical Important
MS10-072 Vulnerabilities in SafeHTML (Replaces MS10-039 )
Internet Explorer
KB 2412048 CVE-2010-3324 has been disclosed publicly. Severity:Important
Exploitability: 3,3
Less urgent Important
MS10-073 Vulnerabilities in Windows Kernel-Mode Drivers (Replaces MS10-048 )
Kernel Mode Drivers
KB 981957 CVE-2010-2743 has been disclosed publicly and is currently being exploited in the Internet ecosystem. CVE-2010-2544 and CVE-2010-2749 have also been disclosed publicly. Severity:Important
Exploitability: 3,1,1
Important Important
MS10-074 Vulnerability in Microsoft Foundation Classes (Replaces MS07-012 )
Foundation Classes
KB 2387149 No known exploits. Severity:Moderate
Exploitability: ?
Important Important
MS10-075 Vulnerability Media Player Network Sharing Service
Media Player Network Sharing Service
KB 2281679 no known exploits. Severity:Critical
Exploitability: 1
Critical Important
MS10-076 Vulnerability in the Embedded OpenType Font Engine
OpenType Font Engine
KB 982132 No known exploits. Severity:Critical
Exploitability: 1
Critical Important
MS10-077 Vulnerability in .NET Framework Could Allow Remote Code Execution
.NET Framework
KB 2160841 No known exploits. Severity:Critical
Exploitability: 1
Critical PATCH NOW!
MS10-078 Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege (Replaces MS10-037 )
OpenType Font (OTF)
KB 2279986 No known exploits. Severity:Important
Exploitability: 1,1
Critical Important
MS10-079 Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (Replaces MS09-068 MS10-056 )

Microsoft Word

KB 2293194 No known exploits. Severity:Important
Exploitability: 1,1
Critical Important
MS10-080 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (Replaces MS10-038 MS10-057 )
KB 2293211 No known exploits. Severity:Important
Exploitability: 1,1,1,1,1,1
Important Important
MS10-081 Comctl32 Heap Overflow Vulnerability
KB 2296011 No known exploits. Severity:Important
Exploitability: 1
Critical Important
MS10-082 Vulnerability in Windows Media Player Could Allow Remote Code Execution (Replaces MS10-027 )
Microsoft Windows
KB 2378111 No known exploits. Severity:Important
Exploitability: 1
PATCH NOW! Critical
MS10-083 Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution
Internet Explorer
KB 2405882 No known exploits. Severity:Important
Exploitability: 1
PATCH NOW! Critical
MS10-084 Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (Replaces MS10-066 )
Microsoft Windows
KB 2360937 This vulnerability has been disclosed publicly. Severity:Important
Exploitability: 1
Critical Important
MS10-085 Vulnerability in SChannel Could Allow Denial of Service (Replaces MS10-049 )
Microsoft Windows, IIS
KB 2183461 No known exploits. Severity:Important
Exploitability: 3
Important Important
MS10-086 Vulnerability in Windows Shared Cluster Disks Could Allow Tampering
Microsoft Windows KB 2294255 No known exploits. Severity:Moderate
Exploitability: ?
Important Important
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
  • The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
  • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
  • Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
  • All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them

Thanks to fellow handlers Johannes, Scott, and Guy!

Adrien de Beaupré Inc.

13 comment(s)

Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites

Published: 2010-10-12
Last Updated: 2010-10-12 20:45:08 UTC
by Scott Fendley (Version: 2)
6 comment(s)

As we all know, social media sites are designed to share information such as who and where you are and what you are doing. This can be a great way to connect to close friends and family, or even re-connect with old classmates and old co-workers.  And it can be a great way to find and connect to new groups with interests common to your own.  

However, there is a fine line with what and how much information to share with these different subsections of your life.  Think about this.  Every public message you post on your Twitter account can be spread around the world in a matter of seconds and possibly will be indexed and found in real-time searches 24/7.  These messages have the power to compromise your safety or your identity, jeopardize your future employment, or just embarrass yourself to the world.  

First, review and use privacy settings.  Most every major social media site such as Facebook, Twitter, and LinkedIn have the ability to control how visible your information and pictures are on the site as well as any search engines who parses that data.  You need to decide how visible you want your contact and profile information, videos, photos, and other posts need to be, and take the time to set the appropriate controls within the media site in question.

Second, don't share information that can help people steal your identity or locate you. It is quite possible for someone to look up your name in a phone book (digital or dead tree version) and find your physical address if it is not already known.  The combination of that publicly available information and your public post about hanging out with friends watching Monday Night Football across town could be enough for someone to take advantage of the situation and break into your house. This would likely require that someone be targeting you or your family specifically.

Third, in most social media sites, you have the ability to limit who can see photos or video tagged with your name.  It is probably best that you do not upload photos or video showing you or your friends doing illegal or inappropriate things in the first place.  But you need to take advantage of any settings that allow you to control how visible this content could be if your friends not exercise good common sense.  Is it really all that smart to post an x-ray image of your broken arm while you are in high school, if your dream is to play baseball professionally?

Fourth, no matter if it is a tweet, a Facebook status update, or something else,  it is recommended that you restrict the delivery of this information to your circle of friends only

Fifth,  online interactions between coaches and potential student athletes must be managed cautiously. Coaches are under even heavier scrutiny than many other people due to NCAA regulations.  Wishing a recruit "Happy Birthday" on their public wall may be considered inappropriate in some circles. It is even possible that re-tweeting a media post by the coaching staff about a recruit visitation could be construed into something that could be a minor violation.

Sixth, be especially careful of malicious links sent via social media accounts.  There are many URL shortening services on the Internet that help when you only have 140 characters in a particular tweet.  Some third party clients to social media sites have the ability to show you the full URL which was masked in the update.  Enabling this will give you some confidence that you are actually going to a known and more-trusted site. In general resist the urge to click on items sent to you no matter the source.

Seventh,  like all computer accounts, you must protect social media accounts from being hijacked.  Using strong passwords on your social media accounts is a must.  And you must be careful to not disclose your credentials to would-be attackers.  Using your credentials, attackers could use your account to lure your circle of friends into clicking a malicious link sent from your account.

Last but not least, think twice before posting or even clicking on a post.  Consider what could happen if a post becomes widely known and how that may reflect both on you (as the poster) or your school or workplace.

There are likely other ideas of how to better protect and manage your digital identity when it comes to social media.  Share these with us via the contact form or comment on this article. 

Scott Fendley
co-ISC Handler on Duty


Thanks to Nathan for the great comment to refine the attack vector regarding "don't share information that can help people steal your identity or locate you".

6 comment(s)

Oracle Critical Updates Released

Published: 2010-10-12
Last Updated: 2010-10-12 20:34:40 UTC
by Scott Fendley (Version: 1)
1 comment(s)

A short while ago, Oracle released the notes for their Critical Patch Update for a number of applications such as database, middleware, business suites, Sun products and Java.  Due to the threats posed by successful attack, Oracle strongly recommends that users apply the CPU fixes for installed applications as soon as possible.  As always, it is recommended that you review the content available at the below URLs and test the updates prior to deploying these to your production environment.

More information is available at 

Oracle Java SE and Java for Business CPU Advisory - October 2010

Oracle Critical Patch Update Advisory - October 2010 

Scott Fendley
ISC Handler

Keywords: Oracle
1 comment(s)


Diary Archives