Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - February 2, 2009

by Marianna Schmudlach / February 1, 2009 11:30 PM PST

VMware ESX / ESXi VMDK Delta Disk Denial of Service Weakness

Release Date: 2009-02-02

Critical:
Not critical
Impact: DoS

Where: From remote
Solution Status: Vendor Patch


OS: VMware ESX Server 3.x
VMware ESXi 3.x

Description:
A weakness has been reported in VMware ESX / ESXi, which can be exploited by malicious people to cause a DoS (Denial of Service).

The weakness is caused due to an error when processing malformed VMDK delta disk files. This can be exploited to crash an ESX host by tricking an administrator into loading a specially crafted VMDK delta disk file.

Solution:
Apply patches.

ESXi 3.5:
Apply ESXe350-200901401-I-SG.
http://download3.vmware.com/software/vi/ESXe350-200901401-O-SG.zip

ESX 3.5:
Apply ESX350-200901401-SG.
http://download3.vmware.com/software/vi/ESX350-200901401-SG.zip

Provided and/or discovered by:
The vendor credits Craig Marshall.

Original Advisory:
http://www.vmware.com/security/advisories/VMSA-2009-0001.html

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - February 2, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - February 2, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Xerox WorkCentre Web Server Unspecified Command Injection
by Marianna Schmudlach / February 1, 2009 11:31 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: System access

Where: From local network
Solution Status: Vendor Patch


OS: Xerox WorkCentre
Xerox WorkCentre Pro

Description:
A vulnerability has been reported in Xerox WorkCentre, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to unspecified parameters is not properly sanitised before being used. This can be exploited to execute arbitrary commands. No further information is currently available.

This vulnerability affects the following versions:
- WorkCentre 232, 238, 245, 255, 265, 275, 5632, 5638, 5645, 5655, 5665, 5675, and 5687
- WorkCentre Pro 232, 238, 245, 255, 265, and 275

Solution:
Apply updates (see vendor's advisory for details).

Provided and/or discovered by:
Reported by vendor.

Original Advisory:
XRX09-001:
http://www.xerox.com/downloads/usa/en/c/cert_XRX09_001.pdf

Collapse -
E-Php B2B Trading Marketplace Script "errmsg" Cross-Site Scr
by Marianna Schmudlach / February 1, 2009 11:32 PM PST

Release Date: 2009-02-02

Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote
Solution Status: Unpatched


Software: E-Php B2B Trading Marketplace Script

Description:
SaiedHacker has reported two vulnerabilities in E-Php B2B Trading Marketplace Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "errmsg" parameter in signin.php and gen_confirm.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
SaiedHacker

Collapse -
Drupal ImageField Module File Upload and Script Insertion
by Marianna Schmudlach / February 1, 2009 11:33 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: System access

Where: From remote
Solution Status: Unpatched


Software: Drupal ImageField Module 5.x

Description:
Some vulnerabilities have been discovered in the ImageField module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system.

Solution:
Edit the source code to ensure that input is properly sanitised and verified.

Provided and/or discovered by:
Justin C. Klein Keane and Andrew Rosborough

Original Advisory:
http://justin.madirish.net/node/338

Collapse -
Google Chrome Cross-Site Scripting and Information Disclosur
by Marianna Schmudlach / February 1, 2009 11:35 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: Cross Site Scripting
Exposure of sensitive information

Where: From remote
Solution Status: Vendor Patch


Software: Google Chrome 1.x

Description:
Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks or to disclose sensitive information.

Solution:
Update to version 1.0.154.46.

Provided and/or discovered by:
1) The vendor credits Michael Schmidt.
2) Reported by the vendor.

Original Advisory:
http://googlechromereleases.blogspot....table-beta-update-yahoo-mail-and.html

Other References:
SA23483:
http://secunia.com/advisories/23483/

Collapse -
OpenBSD BGP UPDATE Message Denial of Service Vulnerability
by Marianna Schmudlach / February 1, 2009 11:36 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: DoS

Where: From remote
Solution Status: Vendor Patch


OS: OpenBSD 4.3
OpenBSD 4.4

Description:
A vulnerability has been reported in OpenBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error while processing BGP UPDATE messages having an invalid AS4_PATH. This can be exploited to terminate a BGP session and potentially disrupt network connectivity via a specially crafted BGP UPDATE message.

Solution:
Apply vendor patches.

OpenBSD 4.3:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/009_bgpd.patch

OpenBSD 4.4:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.openbsd.org/errata44.html
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/bgpd/rde.c?rev=1.230.2.1

Collapse -
Sun Solaris IP Minor Numbers Denial of Service Vulnerability
by Marianna Schmudlach / February 1, 2009 11:37 PM PST

Release Date: 2009-02-02

Critical:
Not critical
Impact: DoS

Where: Local system
Solution Status: Vendor Patch


OS: Sun Solaris 10
Sun Solaris 8
Sun Solaris 9

Description:
Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an error in the IP(7p) (Internet Protocol) implementation related to the allocation of minor numbers. This can be exploited to open an overly large number of sockets in 32-bit applications and e.g. prevent login attempts from completing successfully.

The vulnerability is reported in Solaris 8, 9, and 10 for both the SPARC and x86 platforms, and OpenSolaris builds prior to snv_82.

Solution:
Apply patches.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-248026-1

Collapse -
VMware ESX Server update for net-snmp and libxml2
by Marianna Schmudlach / February 1, 2009 11:39 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: DoS
System access

Where: From remote
Solution Status: Partial Fix


OS: VMware ESX Server 2.x
VMware ESX Server 3.x

Description:
VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

Solution:
Apply patches.

Original Advisory:
http://www.vmware.com/security/advisories/VMSA-2009-0001.html

Other References:
SA32560:
http://secunia.com/advisories/32560/

SA32773:
http://secunia.com/advisories/32773/

Collapse -
Debian update for vnc4
by Marianna Schmudlach / February 1, 2009 11:40 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: DoS
System access

Where: From remote
Solution Status: Vendor Patch


OS: Debian GNU/Linux 4.0
Debian GNU/Linux unstable alias sid

Description:
Debian has issued an update for vnc4. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

Solution:
Apply patches.

Original Advisory:
DSA-1716-1:
http://www.us.debian.org/security/2009/dsa-1716

Other References:
SA32317:
http://secunia.com/advisories/32317/

Collapse -
Novell GroupWise Multiple Vulnerabilities
by Marianna Schmudlach / February 1, 2009 11:41 PM PST

Release Date: 2009-02-02

Critical:
Highly critical
Impact: Security Bypass
Cross Site Scripting
DoS
System access

Where: From remote
Solution Status: Vendor Patch


Software: Novell Groupwise 6.x
Novell GroupWise 7.x
Novell GroupWise 8.x

Description:
Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and script insertion attacks, bypass certain security restrictions, or compromise a vulnerable system.

Solution:
Apply patches.

Note: GroupWise 6.5x reached end of life status. The vendor recommends to upgrade to GroupWise 7.03 HP2 or 8.0 HP1

1) http://www.novell.com/support/viewContent.do?externalId=7002321
2) http://www.novell.com/support/viewContent.do?externalId=7002320
3) http://www.novell.com/support/viewContent.do?externalId=7002319
4) http://www.novell.com/support/viewContent.do?externalId=7002322
5) http://www.novell.com/support/viewContent.do?externalId=7002502

Provided and/or discovered by:
1) Richard Brain, ProCheckup Ltd
2, Jan Fry, ProCheckUp Ltd
3, 4) Adrian Pastor, ProCheckUp Ltd
5) The vendor credits Nick DeBaggis working with TippingPoint's Zero Day Initiative

Original Advisory:
1) http://www.novell.com/support/viewContent.do?externalId=7002321
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23

2) http://www.novell.com/support/viewContent.do?externalId=7002320
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22

3) http://www.novell.com/support/viewContent.do?externalId=7002319
http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-21

4) http://www.novell.com/support/viewContent.do?externalId=7002322
5) http://www.novell.com/support/viewContent.do?externalId=7002502

http://secunia.com/advisories/33744/

Collapse -
SalesCart "name" and "code" SQL Injection Vulnerabilities
by Marianna Schmudlach / February 1, 2009 11:42 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: Security Bypass
Manipulation of data

Where: From remote
Solution Status: Unpatched


Software: SalesCart

Description:
ByALBAYX has reported some vulnerabilities in SalesCart, which can be exploited by malicious people to conduct SQL injection attacks.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
ByALBAYX

Original Advisory:
http://milw0rm.com/exploits/7924

Collapse -
ReVou Twitter Clone Script Insertion and SQL Injection
by Marianna Schmudlach / February 1, 2009 11:44 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: Cross Site Scripting
Manipulation of data

Where: From remote
Solution Status: Unpatched


Software: ReVou Twitter Clone 2.x

Description:
nuclear has reported some vulnerabilities in ReVou Twitter Clone, which can be exploited by malicious people to conduct SQL injection attacks and malicious users to conduct script insertion attacks.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
nuclear

Original Advisory:
http://milw0rm.com/exploits/7925

Collapse -
BPAutoSales SQL Injection and Cross-Site Scripting
by Marianna Schmudlach / February 1, 2009 11:45 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: Cross Site Scripting
Manipulation of data

Where: From remote
Solution Status: Unpatched


Software: BPAutoSales 1.x

Description:
xoron has reported some vulnerabilities in BPAutoSales, which can be exploited by malicious people to conduct SQL injection and cross-site scripting attacks.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
xoron

Original Advisory:
http://milw0rm.com/exploits/7930

Collapse -
Synactis ALL In-The-Box ActiveX Control "SaveDoc()" Arbitrar
by Marianna Schmudlach / February 1, 2009 11:46 PM PST

Release Date: 2009-02-02

Critical:
Highly critical
Impact: System access

Where: From remote
Solution Status: Unpatched


Software: Synactis ALL In-The-Box ActiveX 3.x

Description:
A vulnerability has been discovered in the Synactis ALL In-The-Box ActiveX control, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the All_In_The_Box.AllBox ActiveX control (All_In_The_Box.ocx) providing the insecure "SaveDoc()" method. This can be exploited to overwrite arbitrary files on the system via a filename terminated by a NULL byte.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in All_In_The_Box.ocx version 3.1.2.0. Other versions may also be affected.

Solution:
Set the kill-bit for the affected ActiveX control.

Provided and/or discovered by:
Digital Security Research Group

Original Advisory:
http://www.dsecrg.com/pages/vul/show.php?id=62

Collapse -
Enomaly ECP Insecure Temporary File
by Marianna Schmudlach / February 1, 2009 11:47 PM PST

Release Date: 2009-02-02

Critical:
Not critical
Impact: Privilege escalation

Where: Local system
Solution Status: Vendor Patch


Software: Enomaly ECP 2.x

Description:
A vulnerability has been reported in Enomaly ECP, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

The vulnerability is caused due to the insecure handling of temporary files within "enomalism2.sh", which can be exploited to overwrite arbitrary files or inject arguments to the kill command via symlink attacks.

The vulnerability is reported in versions prior to 2.1.1.

Solution:
Update to version 2.1.1 or later.

Provided and/or discovered by:
Sam Johnston

Original Advisory:
ECP:
http://groups.google.com/group/enomalism/browse_thread/thread/63f6a1474612072b#

Collapse -
D-Link DIR-300 Multiple Vulnerabilities
by Marianna Schmudlach / February 1, 2009 11:48 PM PST

Release Date: 2009-02-02

Critical:
Less critical
Impact: Security Bypass
Cross Site Scripting

Where: From remote
Solution Status: Unpatched


OS: D-Link DIR-300

Description:
Muhaimin Dzulfakar has reported some vulnerabilities and a security issue in D-Link DIR-300, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks, or to bypass certain security restrictions.

The vulnerabilities are reported in firmware version 1.04-tomi-1.1.2. Other versions may also be affected.

Solution:
Do not visit untrusted web sites when being logged in to the administration interface.
Do not follow untrusted links.
Restrict network access to the administration interface.

Provided and/or discovered by:
Muhaimin Dzulfakar, Security-Assessment.com

http://secunia.com/advisories/33692/

Collapse -
PSCS VPOP3 Email Server Script Insertion Vulnerability
by Marianna Schmudlach / February 1, 2009 11:49 PM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: Cross Site Scripting

Where: From remote
Solution Status: Unpatched


Software: PSCS VPOP3 Email Server 2.x

Description:
Nenad Vijatov has discovered a vulnerability in PSCS VPOP3 Email Server, which can be exploited by malicious people to conduct script insertion attacks.

Input passed within e-mail messages is not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when a malicious e-mail message is opened.

This vulnerability is confirmed in version 2.6.0h and 2.6.0i. Other versions may also be affected.

Solution:
Do not open e-mails from untrusted sources.

The vendor has implemented filters in version 2.6.0i, which do not completely fix the vulnerability.

Provided and/or discovered by:
Nenad Vijatov

Original Advisory:
http://discuss.pscs.co.uk/fusionbb/showtopic.php?fid/10/tid/14928/pid/19323

Collapse -
Free Download Manager Multiple Vulnerabilities
by Marianna Schmudlach / February 1, 2009 11:51 PM PST

Release Date: 2009-02-02

Critical:
Highly critical
Impact: System access

Where: From remote
Solution Status: Vendor Patch


Software: Free Download Manager (FDM) 3.x
Free Download Manager 2.x


Description:
Secunia Research has discovered some vulnerabilities in Free Download Manager, which can be exploited by malicious people to compromise a user's system.

Solution:
Update to version 3.0 build 848.

Provided and/or discovered by:
Carsten Eiram, Secunia Research.

Original Advisory:
Secunia Research:
http://secunia.com/secunia_research/2009-3/
http://secunia.com/secunia_research/2009-5/

http://secunia.com/advisories/33524/

Collapse -
OpenX Multiple Vulnerabilities
by Marianna Schmudlach / February 1, 2009 11:52 PM PST

Summary
"OpenX is a popular free ad server used to manage the advertising on over 100,000 websites in more than 100 countries around the world. Use OpenX to take control of the advertising on your sites". Multiple vulnerabilities have been discovered in OpenX, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and file inclusion attacks and by malicious users to conduct script insertion and SQL injection attacks.

Credit:
The information has been provided by Secunia Research.
The original article can be found at: http://secunia.com/secunia_research/2009-4/

http://www.securiteam.com/unixfocus/5VP010AQAW.html

Collapse -
Enomaly ECP/Enomalism Insecure Temporary File Creation Vulne
by Marianna Schmudlach / February 1, 2009 11:53 PM PST

Summary
Sam Johnston of Australian Online Solutions reported that enomalism2.sh uses the /tmp/enomalism2.pid temporary file in an insecure manner.

Credit:
The information has been provided by Sam Johnston.

http://www.securiteam.com/unixfocus/5WP020AQAI.html

Collapse -
Novell GroupWise WebAccess Cross-Site Request Forgery (CSRF
by Marianna Schmudlach / February 1, 2009 11:54 PM PST

Summary
A vulnerability in Novell's GroupWise WebAccess product has been found to allow attackers to forge responses that are returned by the server, this in turn can be used to trick the legitimate users of the product.

Credit:
The information has been provided by ProCheckUp Research.


http://www.securiteam.com/securitynews/5XP030AQAK.html

Collapse -
Fresh privacy fears over IE 8 Suggested Sites
by Marianna Schmudlach / February 1, 2009 11:56 PM PST

Promiscuous URL sharing not a great idea, warns top Cambridge researcher

By John Leyden
2nd February 2009

A top security researcher has called for Microsoft to rethink aspects of its Suggested Sites feature in IE8. The optional feature in the next version of Microsoft's browser allows users to "discover websites you might like based on sites you've visited", as Microsoft explains it.

When the feature is activated, the addresses of sites visited are sent to Microsoft, alongside informations such as IP address, browser type, regional and language settings, in an encrypted form. Microsoft draft IE8 privacy policy explains that "information associated with the web address, such as search terms or data you entered in forms might be included".

Microsoft was able to allay concerns that data from secure sites might be sampled or that the feature might be used to serve up targeted advertising in response to our earlier queries on the technology, prompted in response to posts by privacy activists on the No Deep Packet Inspection campaign website. However, concerns about the privacy implications of the technology remain.

More: http://www.theregister.co.uk/2009/02/02/ie8_suggested_sites/

Collapse -
UAC vulnerability found in Windows 7 Beta
by Marianna Schmudlach / February 2, 2009 12:01 AM PST

2 February 2009

A simple script has been published by developer Rafael Rivera, which uses a vulnerability in the current Windows 7 beta to disable User Account Control (UAC). In a response to complaints about UAC in Windows Vista, Microsoft has made UAC in Windows 7 ask the user for permission less often and even hides prompts when users change Windows settings. Changing the UAC system settings has been made a lot easier for users in the new Windows 7 beta as the default security has been reduced.

More: http://www.heise-online.co.uk/security/UAC-vulnerability-found-in-Windows-7-Beta--/news/112532

Collapse -
VMware Releases Security Advisory
by Marianna Schmudlach / February 2, 2009 12:04 AM PST

added February 2, 2009 at 09:14 am

VMware has released a Security Advisory indicating that it has updated the ESX packages to address vulnerabilities in libxml2 and net-snmp. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

US-CERT encourages users and administrators to review VMware Security Advisory VMSA-2009-0001 and apply any necessary updates to help mitigate the risks.


http://www.us-cert.gov/current/current_activity.html#vmware_releases_security_advisory1

Collapse -
PerlSoft G
by Marianna Schmudlach / February 2, 2009 7:03 AM PST

Release Date: 2009-02-02

Critical:
Moderately critical
Impact: System access
Where: From remote
Solution Status: Unpatched

Software: PerlSoft G

Collapse -
Oracle Forms Cross-Site Scripting Vulnerabilities
by Marianna Schmudlach / February 2, 2009 7:05 AM PST

Release Date: 2009-02-02

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched

Software: Oracle Developer Suite 10g
Oracle E-Business Suite 11i

Description:
Some vulnerabilities have been reported in Oracle Forms, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via the "form" parameter to ifcgi60.exe and f60servlet is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

The vulnerabilities are reported in Oracle Forms 6i and E-Business Suite 11i. Other versions may also be affected.

Solution:
Filter malicious characters and character sequences in a web proxy.

Provided and/or discovered by:
Oleg P.

Original Advisory:
http://archives.neohapsis.com/archives/bugtraq/2009-01/0279.html

Collapse -
Oracle Application Server Cross-Site Scripting Vulnerabiliti
by Marianna Schmudlach / February 2, 2009 7:08 AM PST

Release Date: 2009-02-02

ritical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched

Software: Oracle Application Server 10g

Description:
Some vulnerabilities have been reported in Oracle Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "site2pstoretoken" parameter in login.jsp and via the "search_type" parameter to an unspecified script is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

The vulnerabilities are reported in Oracle Application Server Portal version 10.1.3. Other versions may also be affected.

Solution:
Filter malicious characters and character sequences in a web proxy.

Provided and/or discovered by:
Oleg P.

Original Advisory:
http://archives.neohapsis.com/archives/bugtraq/2009-01/0281.html

Collapse -
Microsoft fortifies IE8 against new XSS exploits
by Marianna Schmudlach / February 2, 2009 7:59 AM PST

Catching attacks without breaking the web

By Dan Goodin in San Francisco
2nd February 2009

Engineers in Microsoft's Internet Explorer group continue to refine a new security feature designed to block malicious scripts that can be injected into trusted websites to steal email and account credentials. Judging from the magnitude of the problem, their task may never be completed.

Among the multitude of revisions introduced in last week's release of Internet Explorer 8 were tweaks intended to make the browser's cross-site scripting (XSS) filter better withstand tricks for concealing malicious characters in web addresses. Some of the world's foremost web application security experts helped, an indication of the difficulty of containing the threat.

One fix enables input to be treated as a stream of individual bytes rather than characters, a change that prevents attackers from evading the filter using Chinese characters in web addresses. Because of the way certain characters, including "<" are rendered in Chinese, bad guys were able to sneak them into malicious URLs that weren't detected by versions of the Microsoft beta browser.

More: http://www.theregister.co.uk/2009/02/02/ie8_xss_filter_improvements/

Collapse -
Gears of War grind to halt
by Marianna Schmudlach / February 2, 2009 8:01 AM PST

Expired digital cert kills PC play

By Austin Modine
2nd February 2009

A digital certificate that expired Wednesday ground Gears of War to a halt last week, leaving many unable to launch the original PC-version of the first person shooter until Epic Games works out a fix.

The online cheat detection used in Gears relies on a Windows digital certificate that expired January 28, 2009. Gamers attempting to launch Gears since Wednesday have been blocked with an error saying the game can't run "with modified executable code."

"Well, we made an embarrassing mistake: we signed the executable with a certificate that expired in a way that broke the game," said an Epic Games spokesperson posting on the official Gears forum.

More: http://www.theregister.co.uk/2009/02/02/gears_of_war_pc_bug/

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

Does BMW or Volvo do it best?

Pint-size luxury and funky style

Shopping for a new car this weekend? See how the BMW X2 stacks up against the Volvo XC40 in our side-by-side comparison.