Important Security Updates
Adobe Flash Player: Adobe has released version 220.127.116.11 to fix at least 12 unpatched vulnerabilities, some of which are highly critical, in its Flash Player for the Windows and Mac versions. Updates are available from Adobe’s website. Updates are also available for AIR.
Apple iTunes: Apple has released version 11.4 of iTunes for Windows (64-bit). Updates are available from Apple’s website.
AVG Free Edition: AVG has released version 2015.0.5315 of its 32 bit Free Edition. Updates are available on AVG’s website.
D-Link DIR-626L/DIR-836L/826L: D-Link has released updates for its DIR-626L, DIR-826L and DIR-836L wireless cloud routers to fix moderately critical vulnerabilities reported in previous firmware versions. Update to a fixed version. Updates are available from D-Link’s website.
Google Chrome: Google has released Google Chrome version 37.0.2062.120 for Windows, Mac, and Linux to fix at least 14 vulnerabilities, some of which are highly critical, reported in previous versions. Updates are available from within the browser or from Google Chrome’s website.
Malwarebytes Anti-Exploit: Malwarebytes has released version 1.04.1.1012 of its free Malwarebytes Anti-Exploit. Updates are available from Malwarebytes’ website.
Microsoft Internet Explorer: Microsoft has released updates for all versions of Internet Explorer to fix at least 37 vulnerabilities, some of which are highly critical. Updates are available from within Windows Control Panel or from Microsoft’s website.
Microsoft Patch Tuesday: Microsoft’s Patch Tuesday released 9 updates to address at least 37 vulnerabilities, some of which are highly critical within Windows, Internet Explorer, Office, Windows Media Center, One Note, SQL Server, SharePoint and other Microsoft products.
Mozilla Firefox: Mozilla has released version 32.0.1. Updates are available within the browser or from Mozilla’s website.
Current Software Versions
Adobe Flash 18.104.22.168 [Windows 7: IE]
Adobe Flash 22.214.171.124 [Windows 7: Firefox, Mozilla]
Adobe Flash 126.96.36.199 [Windows 8: IE]
Adobe Flash 188.8.131.52 [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader 11.0.08
Dropbox 2.10.29 [Citadel warns against relying on Dropbox security. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the Dropbox password be at least 15 characters long and different from other passwords.]
Firefox 32.0.1 [Windows]
Google Chrome 37.0.2062.120
Internet Explorer 11.0.9600.17280
Java SE 7 Update 67 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Safari 5.1.7 [Windows]
Safari 7.0.4 [Mac OS X]
Newly Announced Unpatched Vulnerabilities
Adobe Reader/Acrobat: Secunia reports moderately critical unpatched vulnerabilities in Adobe Reader XI and Acrobat XI versions 11.0.08 and prior for Windows, Adobe Reader XI and Acrobat XI versions 11.0.07 and prior for Macintosh, Adobe Reader X and Acrobat X versions 10.1.11 and prior for Windows, Adobe Reader X and Acrobat X versions 10.1.10 and prior for Macintosh. Other versions may also be affected. No solution is currently available. The vendor is planning to release an update within the week of September 15th, 2014.
For Your IT Department
Cisco Multiple Products: Secunia reports Cisco has released updates for IOSXR and Unified Computing System (UCS). Apply available updates. Secunia reports unpatched vulnerabilities in Unified Communications Manager, Intelligent Automation for Cloud, UCS Director, Cloud Portal, TelePresence System MXP Series, Unified Computing System (UCS), Unified Communications Manager and others. No official solutions is currently available.
VMware ESXi: Secunia reports VMware has released a partial fix for ESXi to address 2 vulnerabilities reported in versions 5.0, 5.1 and 5.5. Apply update if available.
VMware NSX/vCloud Networking and Security: Secunia reports VMware has released an update for NSX / vCloud Networking and Security to fix a vulnerability reported in VMware NSX Edge versions prior to 6.0.6 and VMware vCloud Networking and Security (vCNS) Edge versions prior to 5.5.3 and prior to 184.108.40.206. Update to a fixed version.
VMware vCenter Server: Secunia reports VMware has released updates for its vCenter Server to fix at least 41 unpatched vulnerabilities, some of which are moderately critical, reported in previous versions. Update to version 5.5 Update 2.
VMware vSphere Update Manager: Secunia reports VMware has released updates for its vSphere Update Manager to fix at least 36 vulnerabilities, some of which are moderately critical, reported in previous versions. Update to version 5.5 Update 2.
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Copyright © 2014 Citadel Information Group. All rights reserved.