CDSA

Weekend Vulnerability and Patch Report, July 10, 2016 (Citadel Information Group)

[svg-table-content]

Important Security Updates

Dropbox: Dropbox has released version 6.4.14 for its file hosting program. Updates are available at Dropbox’s website. [See Citadel’s warning below]

Opera: Opera has released version 38.0.2220.41. Updates are available from within the browser or from Opera’s website.

Current Software Versions

Adobe Flash 22.0.0.192

Adobe Reader DC 2015.016.20039

Dropbox 6.4.14 [Citadel warns against relying on security of Dropbox or other cloud-based file exchange systems. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the master Dropbox [or other] password be at least 15 characters long and different from other passwords.]

Firefox 47.0.1 [Windows]

Google Chrome 51.0.2704.106

Internet Explorer 11.0.9600.18161

Java SE 8 Update 91 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]

QuickTime 7.7.9 [Citadel recommends removing QuickTime. On April 14, US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Apple has no plans to update the Windows app despite at least two reliable QuickTime vulnerabilities that threaten Windows users who still have the program installed.]

Safari 9.1 [Mac OS X Mavericks, Yosemite, El Capitan]

Skype 7.25.0.106

For Your IT Department

Cisco Multiple Products: Cisco reports patched vulnerabilities in its Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software versions X8.1 and later, and AMP Threat Grid Appliance running a software version prior to 2.1.1. Apply updates. Cisco also reports unpatched vulnerabilities in its Cisco Prime Infrastructure versions 3.1.0 and prior. There are no workarounds available. Additional details are available at Cisco’s website.

McAfee Network Data Loss Prevention: McAfee has released security updates for its Network Data Loss Prevention to fix three vulnerabilities. Update with Network Data Loss Prevention (NDLP) Hotfix 9.3.4.1.2. Additional details are available at McAFee’s website.

Novell Open Enterprise Server: Novell has released an update to fix multiple vulnerabilities in its Open Enterprise Server versions 11.2 and 2015 (OES 11 SP2 and OES 2015). For version 11.2 apply patch oes11sp2-xen-10881. For version 2015 apply patch oes2015-xen-10882. Additional details are available at Novell’s website.

Teamviewer: TeamViewer has released version 11.0.62308. Updates are available from TeamViewer’s website.