Weekly Security Review Apr27-May01.doc - LANDesk User ...

towerdevelopmentΔιαχείριση Δεδομένων

16 Δεκ 2012 (πριν από 4 χρόνια και 8 μήνες)

267 εμφανίσεις




LANDesk
®

Security Review for the Week Ending
May

0
1
,

200
9

LANDesk
®

Patch Manager and Security
Suite (“LD
S
S”)
provide customers with the latest security and
application patches and updates for the most utilized software in your busin
ess. Maintaining a safe and
secure environment helps to avoid downtime that will affect employees and productivity. The following
items are the patch and update highlights from this past week.

Windows Content

Vulnerability Definitions



Vulnerability ID:

969
376

o

LANDesk

Patch News Bulletin: The Updated Microsoft Junk E
-
mail
Filter for Outlook 2003 is Available 29
-
APR
-
2009

o

Update for Microsoft Outloo
k 2003 Junk Email Filter (KB969376)




Vulnerability ID:
968503

o

LANDesk Patch News Bulletin: The Microsoft Junk E
-
mail Filter for
Outlook 2007 is Available 30
-
APR
-
2009

o

Update for Microsoft Office Outlook 2007 Junk Email Filter (KB968503)




Vulnerability ID:
ACTIVE_PROTECTIONv1.63

o

LANDesk Patch News Bulletin: Lenovo has Released version 1.63 of
ThinkVantage Active Protection System for Windows 30
-
APR
-
2009

o


ThinkVantage Active Protection System for Windows





Vulnerability ID:
MS09
-
012v2

o

LANDesk Patch News Bulletin: Microsoft has Updated MS
09
-
012 for
NOR 30
-
APR
-
2009

o

Microsoft Security Bulletin MS09
-
012
-

Important


Mac Content

Vulnerability

Definitions



Vulnerability ID:

ENU_Firefox3.0.10
_Update

o

LANDesk Patch News Bulletin: Mozilla's Firefox Version 3.0.10 for
MAC is Avai
lable for Download 28
-
APR
-
2009

o

Firefox 3 Release Notes

Linux Content

Vulnerability Definitions

HPUX:
5
vulnerabilities;

V_INTL_PHNE_39167 (New)

V_INTL_PHCO_38273

V_INTL_PHNE_3789
7

V_INTL_PHNE_37898

V_INTL_PHSS_38840

Redhat:
7
vulnerabilities;

V_INTL_RHSA
-
2009
-
0436 (New)

V_INTL_RHSA
-
2009
-
0437 (New)

V_INTL_RHSA
-
2009
-
0444 (New)

V_INTL_RHSA
-
2009
-
0445 (New)

V_INTL_RHSA
-
2009
-
0429

V_INTL_RHSA
-
2009
-
0430

V_INTL_RHSA
-
2009
-
0431

S
LES:
52

vulnerabilities;

V_INTL_patch
-
12364 (Changed)

V_INTL_patch
-
12373 (Changed)

V_INTL_patch
-
12377 (Changed)

V_INTL_patch
-
12378 (Changed)

V_INTL_patch
-
12380 (Changed)

V_INTL_patch
-
12381 (Changed)

V_INTL_patch
-
12382 (Changed)

V_INTL_dbgp2
-
apache
2
-
mod_php5
-
6069

V_INTL_dbgp2
-
freeradius
-
6000

V_INTL_dbgp2
-
glibc
-
6134

V_INTL_dbgp2
-
gnutls
-
6073

V_INTL_dbgp2
-
grub
-
6200

V_INTL_dbgp2
-
kernel
-
6109

V_INTL_dbgp2
-
kernel
-
6113

V_INTL_dbgp2
-
krb5
-
6140

V_INTL_dbgp2
-
mkinitrd
-
6061

V_INTL_dbgp2
-
MozillaFirefox
-
61
87

V_INTL_dbgp2
-
php5
-
timezonedb
-
6207

V_INTL_dbgp2
-
udev
-
6153

V_INTL_dbgp2
-
udev
-
6203

V_INTL_dbgp2
-
xntp
-
6072

V_INTL_patch
-
12383

V_INTL_patch
-
12384

V_INTL_patch
-
12387

V_INTL_patch
-
12388

V_INTL_patch
-
12389

V_INTL_slesp1
-
sles
-
release
-
5930

V_INTL_slesp
2
-
apache2
-
mod_php5
-
6069

V_INTL_slesp2
-
clamav
-
6144

V_INTL_slesp2
-
clamav
-
6188

V_INTL_slesp2
-
cups
-
6174

V_INTL_slesp2
-
freeradius
-
6000

V_INTL_slesp2
-
glibc
-
6134

V_INTL_slesp2
-
gnutls
-
6073

V_INTL_slesp2
-
grub
-
6200

V_INTL_slesp2
-
java
-
1_4_2
-
ibm
-
6136

V_INTL_s
lesp2
-
kdepim3
-
6160

V_INTL_slesp2
-
kernel
-
6109

V_INTL_slesp2
-
kernel
-
6113

V_INTL_slesp2
-
krb5
-
6140

V_INTL_slesp2
-
libsndfile
-
6040

V_INTL_slesp2
-
mkinitrd
-
6061

V_INTL_slesp2
-
MozillaFirefox
-
6187

V_INTL_slesp2
-
openswan
-
6117

V_INTL_slesp2
-
php5
-
timezonedb
-
620
7

V_INTL_slesp2
-
postgresql
-
6114

V_INTL_slesp2
-
strongswan
-
6116

V_INTL_slesp2
-
struts
-
6122

V_INTL_slesp2
-
udev
-
6153

V_INTL_slesp2
-
udev
-
6203

V_INTL_slesp2
-
xntp
-
6072

V_INTL_slesp2
-
xpdf
-
6177

Solaris: 139 vulnerabilities;

V_INTL_108528

V_INTL_108773

V_I
NTL_108835

V_INTL_108869

V_INTL_108899

V_INTL_108909

V_INTL_108919

V_INTL_108940

V_INTL_108949

V_INTL_108964

V_INTL_108968

V_INTL_108975

V_INTL_108981

V_INTL_108985

V_INTL_108987

V_INTL_109007

V_INTL_109023

V_INTL_109025

V_INTL_109077

V_IN
TL_109091

V_INTL_109134

V_INTL_109147

V_INTL_109149

V_INTL_109152

V_INTL_109154

V_INTL_109202

V_INTL_109223

V_INTL_109238

V_INTL_109320

V_INTL_109324

V_INTL_109326

V_INTL_109328

V_INTL_109354

V_INTL_109454

V_INTL_109458

V_INTL_109613

V_INT
L_109667

V_INTL_109695

V_INTL_109764

V_INTL_109783

V_INTL_109793

V_INTL_109815

V_INTL_109862

V_INTL_109887

V_INTL_109893

V_INTL_109894

V_INTL_109896

V_INTL_109922

V_INTL_109931

V_INTL_109951

V_INTL_110068

V_INTL_110075

V_INTL_110286

V_INTL
_110322

V_INTL_110335

V_INTL_110386

V_INTL_110389

V_INTL_110416

V_INTL_110453

V_INTL_110458

V_INTL_110461

V_INTL_110615

V_INTL_110668

V_INTL_110670

V_INTL_110820

V_INTL_110896

V_INTL_110898

V_INTL_110903

V_INTL_110910

V_INTL_110916

V_INTL_
110934

V_INTL_110943

V_INTL_110945

V_INTL_110953

V_INTL_110955

V_INTL_110957

V_INTL_111069

V_INTL_111071

V_INTL_111232

V_INTL_111234

V_INTL_111313

V_INTL_111321

V_INTL_111325

V_INTL_111327

V_INTL_111332

V_INTL_111400

V_INTL_111504

V_INTL_1
11548

V_INTL_111570

V_INTL_111596

V_INTL_111606

V_INTL_111626

V_INTL_111647

V_INTL_111826

V_INTL_111844

V_INTL_111874

V_INTL_111881

V_INTL_111883

V_INTL_112039

V_INTL_112169

V_INTL_112237

V_INTL_112390

V_INTL_112459

V_INTL_112609

V_INTL_11
2611

V_INTL_112668

V_INTL_112792

V_INTL_112796

V_INTL_112846

V_INTL_113650

V_INTL_113685

V_INTL_113687

V_INTL_113749

V_INTL_113792

V_INTL_114045

V_INTL_114162

V_INTL_114669

V_INTL_114673

V_INTL_114802

V_INTL_114816

V_INTL_114984

V_INTL_115
797

V_INTL_116455

V_INTL_116959

V_INTL_116965

V_INTL_116973

V_INTL_116984

V_INTL_116986

V_INTL_116993

V_INTL_116997

V_INTL_117000

V_INTL_117350

V_INTL_117950

V_INTL_119067

V_INTL_119209

V_INTL_122091

V_INTL_124420

V_INTL_124969

V_INTL_1254
37

Spyware Updates

Definitions



Core.aawdef Version

(148.
0013
---
148.0017
)

o

LANDesk

Patch News Bulletin: Core.148.13.aawdef,
Core.148.14.aawdef and Core.148.15
.aawdef are

available
on
27
-
Apr
-
2
00
9


o

LANDesk

Patch News Bulletin: Core.148.16.aawdef and
Core.148.17
.aawdef are

available
on
29
-
Apr
-
200
9


LANDesk
®

Tips

Getting t
he most out of LANDesk Security and Patch Manager

o

How to tell what LANDesk Antivirus Engine is installed on a client

o

Community.landesk.com



Security News

The PCI DSS security standard




This week’s article is for those of you who have to endure the painful
experience that is the Payment Card Industry Data Security Standard (PCI
DSS). For those of you who don’t have to deal with PCI DSS there is

probably a painful security standard for you out there somewhere. This
week’s article takes a critical look at the PCI DSS and poses some
interesting questions that many would like to see the PCI Security
Standards Council address.

o

Where PCI DSS Still Falls Short and How to Improve It

o

http://www.computerworld.com


Where to Send Feedback

At LANDesk, we are constantly striving to improve our products and services and hope
you find these changes reflective of our ongoing commitment to listen to you
-
our
partners and customers
-
in provid
ing the best possible solutions to meet your needs now
and in the future. Please continue to provide feedback by contacting our local support
organization.

Best regards,

LANDesk Product Support

Copyright © 200
9

LANDesk Software. All rights reserved. LANDe
sk is either a
registered trademark or trademark of LANDesk Software, Ltd. or its affiliated entities in
the United States and/or other countries. Other names or brands may be claimed as the
property of others.

Information in this document is provided for
information purposes only. The
information presented here is subject to change without notice. This information is not
warranted to be error
-
free, nor subject to any other warranties or conditions, whether
expressed orally or implied in law, including any
implied warranties and conditions of
merchantability or fitness for a particular purpose. LANDesk disclaims any liability with
respect to this document and LANDesk has no responsibility or liability for any third
party products of any content contained on
any site referenced herein. This document
may not be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without our prior written permission. For the most current
product information, please visit
http://www.landesk.com
.