Anzeigen der neuesten Beiträge
0 Mitglieder und 1 Gast betrachten dieses Thema.
Stinger Release NotesBuild Number: 11.0.0.206Build Date: 25-Mar-2013Stinger 32bit MD5: 469c24e508c544cf770d0aa553ddeecd SHA1: c35d6d96e9cc223a3a05432e0e25ce63244b6e2fStinger-ePO 32bit MD5: 43393f77f71979511f0ac4fc0b0ed081 SHA1: fef43fd8d32ec0b2ebc7823de2eb796c51635840Stinger 64bit MD5: dea8c66e5ead3de4ed8b2a82532bc780 SHA1: 12d6b826569a35e9dcd258ebe8b0655927c0e6e1Stinger-ePO 64bit MD5: 95dc08ac2d9815c0b6175c835e420e9f SHA1: 78018a5e3f04edf147ab7dcf1b6252a3e24083dbEnhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.ldEnhanced Detections:• Exploit-CVE2011-1990• FakeAlert-SecurityTool.fl• FakeAlert-SecurityTool.fx• FakeAlert-SecurityTool.ga• Generic Downloader.z• Generic FakeAlert• Generic PWS.aac• JS/Exploit-Blacole• JS/Exploit-Blacole.em• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.kh• JS/Exploit-Blacole.kx• JS/Exploit-Blacole.lc• JS/Exploit-Blacole.ld• PWS-DOD.a• W32/Autorun.worm.c• ZeroAccess• ZeroAccess.hr
Stinger Release NotesBuild Number: 11.0.0.207Build Date: 26-Mar-2013Stinger 32bit MD5: 2d4bb1c134b2d07fbabe2b37431ed87f SHA1: 51a4835e38cde2aad50b0cc1e28ecee978f05519Stinger-ePO 32bit MD5: 1ff36572ca35fcaa940bd6d7e83a5c04 SHA1: 54163b5f03605449e6c0fcae7d7164f01fbaa8bcStinger 64bit MD5: 8dfad7f6574f0f5929fcb48a2424ff12 SHA1: 0a4efd8c49f1c6b25f5f8e1f804c4bbfaaa672d2Stinger-ePO 64bit MD5: 921066e886942f9ef28f7e2b8edc6616 SHA1: 8d32c9280cd695da494a251bed8bbe369d15b281Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.Enhanced Detections:• Generic Downloader.z• Generic FakeAlert.eo• JS/Exploit-Blacole.cw• JS/Exploit-Blacole.gc• PWS-Fmocx.a• PWS-Zbot• PWS-Zbot.gen.agz• PWS-Zbot.gen.any• PWS-Zbot.gen.aov• PWS-Zbot.gen.arw• PWS-Zbot.gen.asm• W32/Autorun.worm.aaeh• W32/Autorun.worm.c• ZeroAccess
Tuesday, March 26, 2013Stable Channel UpdateThe Chrome team is excited to announce the promotion of Chrome 26 to the Stable Channel. Chrome 26.0.1410.43 for Windows, Mac, Linux, and Chrome Frame contains number of new items including: "Ask Google for suggestions" spell checking feature improvements (e.g. grammar and homonym checking) Desktop shortcuts for multiple users (profiles) on Windows Asynchronous DNS resolver on Mac and LinuxSecurity fixes and rewards:Please see the Chromium security page for more information. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix. [$1000] [172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen of OUSPG. [180909] Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google Chrome Security Team (Cris Neckar). [180555] Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit to Vsevolod Vlasov of the Chromium development community. [Linux only] [178760] Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions. Credit to Google Chrome Security Team (Mustafa Emre Acer). [177410] Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [174943] High CVE-2013-0921: Ensure isolated web sites run in their own processes. [174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to “t3553r”. [169981] [169972] [169765] Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [169632] Low CVE-2013-0924: Check an extension’s permissions API usage again file permissions. Credit to Benjamin Kalman of the Chromium development community. [168442] Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs permissions. Credit to Michael Vrable of Google. [112325] Medium CVE-2013-0926: Avoid pasting active tags in certain situations. Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c (xysec.com).A full list of changes in this build is available in the SVN revision log.
Stinger Release NotesBuild Number: 11.0.0.209Build Date: 27-Mar-2013Stinger 32bit MD5: 084d0a38922f10e5477c728b18105e4e SHA1: cf8e0d05f8711b44261580d5363f6b639d5f42abStinger-ePO 32bit MD5: b7ef8da0a1d6e1decf845fdcaf3fa5d9 SHA1: e5e1aa57dfd60528d41f0407c745b8f545332b74Stinger 64bit MD5: 5e09ef0e11ea3ca593b8cdb3ea3ce33a SHA1: 53ca8904de4f2edab3c75b05e2c27bc55975ff8cStinger-ePO 64bit MD5: 7805ceee5901850f6cb49e13b2c6554c SHA1: afe6d67c33c4cd8464f1a74558f9831946bde379 Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.le• JS/Exploit-Blacole.lfEnhanced Detections:• Exploit-CVE2011-1990• False Digisig present• JS/Exploit-Blacole• JS/Exploit-Blacole.gg• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.ky• JS/Exploit-Blacole.kz• JS/Exploit-Blacole.la• JS/Exploit-Blacole.lb• JS/Exploit-Blacole.lc• JS/Exploit-Blacole.ld• PWS-Zbot.gen.any• PWS-Zbot.gen.arw• W32/Autorun.worm.g• ZeroAccess
The Dev channel has been updated to 27.0.1453.3 for Mac, Windows, Linux, and Chrome FrameFull details about what changes are in this build are available in the SVN revision log.