Affected Software: avast! Antivirus 4.x
A security issue has been reported in avast! Antivirus, which can be exploited by malicious, local users to bypass certain security restrictions or gain escalated privileges.
The security issue is caused due to insecure default file permissions being set on the installed files and folders. This allows any non-privileged users on the system to remove the files or replace them with malicious binaries.
Successful exploitation reportedly requires that the TEMP folder is on the same drive as the avast! installation folder.
The security issue has been confirmed in avast! Professional Edition version 4.6.763 with database 612-0 and also reported in the Home Edition. Other versions may also be affected.
Solution: Restrict access to affected systems.
Internet Explorer Multiple Event Handlers Denial of Service Weakness
SECUNIA ADVISORY ID:
Microsoft Internet Explorer 6.x
Michal Zalewski has discovered a weakness in Internet Explorer, which
can be exploited by malicious people to cause a DoS (Denial of
The vulnerability is caused due to an array boundary error in the
handling of HTML tags with multiple event handlers. This can be
exploited to crash a vulnerable browser via a HTML tag with 94 or
more event handlers.
The weakness has been confirmed on a fully patched system with
Internet Explorer 6.0 and Microsoft Windows XP SP2.
Do not visit untrusted web sites.
PROVIDED AND/OR DISCOVERED BY: