Focus on Microsoft
SecurityFocus Microsoft Newsletter #441 Apr 27 2009 02:50PM
Rob Keith (rkeith securityfocus com)
SecurityFocus Microsoft Newsletter #441
----------------------------------------

This issue is sponsored by Webex

Desktop Security On Demand

Today, the pressures of technology threats, regulatory compliance, and cost control have combined to force a renewed focus on corporate IT management. As a result, security and system management are top-of-mind considerations for IT managers within businesses of all sizes. Learn more today!

http://dinclinx.com/Redirect.aspx?36;4905;35;189;0;3;259;0e72602f272b1d7
e

SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.Celebrity Viruses Improve Security
2.Good Obfuscation, Bad Code
II. MICROSOFT VULNERABILITY SUMMARY
1. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability
2. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
3. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service Vulnerabilities
4. Acritum Femitter Server Remote File Disclosure Vulnerability
5. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability
6. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability
7. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability
8. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
9. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability
10. Microsoft Windows Media Player WAV File Multiple Denial of Service Vulnerabilities
11. Microsoft GDI+ Plugin PNG File Infinite Loop Denial of Service Vulnerability
12. Microsoft Windows Media Player MIDI File Denial of Service Vulnerability
13. MagicISO CCD/Cue File Heap Overflow Vulnerability
14. MiniWeb Source Code Information Disclosure Vulnerability
15. MiniWeb Remote Buffer Overflow Vulnerability
16. Elecard AVC HD Player '.xpl' File Remote Stack Buffer Overflow Vulnerability
17. Apollo 'm3u' Playlist File Heap Buffer Overflow Vulnerability
18. RETIRED: Microsoft Windows Media Player MID File Parsing Integer Overflow Vulnerability
19. Microsoft IAG 2007 ActiveX Control Multiple Stack Based Buffer Overflow Vulnerabilities
20. Zervit 'http.c' Remote Buffer Overflow Vulnerability
21. Mini-stream Software RM-MP3 Converter '.pls' File Remote Stack Buffer Overflow Vulnerability
22. Microsoft WordPad Word 97 Converter Remote Code Execution Vulnerability
23. Microsoft Word 2000 WordPerfect Converter Remote Code Execution Vulnerability
24. Microsoft DirectX DirectShow MJPEG Video Decompression Remote Code Execution Vulnerability
25. Microsoft Windows Thread Pool ACL Local Privilege Escalation Vulnerability
26. Microsoft Windows RPCSS Service Isolation Local Privilege Escalation Vulnerability
27. Microsoft Windows WMI Service Isolation Local Privilege Escalation Vulnerability
28. Microsoft Windows NTLM Credential Reflection Remote Code Execution Vulnerability
29. Microsoft Internet Explorer Page Transition Remote Code Execution Vulnerability
30. Microsoft WinHTTP Server Name Mismatch Certificate Validation Security Bypass Vulnerability
31. Microsoft WinHTTP Integer Underflow Memory Corruption Remote Code Execution Vulnerability
32. Microsoft Internet Explorer Marquee Tag Handling Remote Code Execution Vulnerability
33. Microsoft Internet Explorer 'EMBED' Tag Uninitialized Memory Remote Code Execution Vulnerability
34. Microsoft Internet Explorer Uninitialized Memory Variant One Remote Code Execution Vulnerability
35. Microsoft ISA Server and Forefront Threat Management Gateway Cross-Site Scripting Vulnerability
36. Microsoft ISA Server and Forefront Threat Management Gateway Denial of Service Vulnerability
37. Microsoft Excel Malformed Object Remote Memory Corruption Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #440
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.Celebrity Viruses Improve Security
By Adam O'Donnell
Every so often, a computer virus becomes more than just a novelty for anti-virus researchers and moves into the consciousness of the mass media, even if it's not a grave threat.
http://www.securityfocus.com/columnists/499

2.Good Obfuscation, Bad Code
Antivirus analysts and security testers have to deal with a fundamental question every day: Is obfuscated code good or bad?
http://www.securityfocus.com/columnists/498

II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 34699
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34699
Summary:
Popcorn is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly sanitize user-supplied input.

An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition.

Popcorn 1.87 is vulnerable; other versions may also be affected.

2. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
BugTraq ID: 34698
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34698
Summary:
Home Web Server is prone to a denial-of-service vulnerability because it fails to adequately handle malformed HTTP requests.

Attackers can exploit this issue to cause the graphical interface of the server to stop responding, denying service to the administrator.

Home Web Server 1.7.1.147 is vulnerable; other versions may also be affected.

3. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service Vulnerabilities
BugTraq ID: 34696
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34696
Summary:
Symantec Norton Ghost EasySetup Wizard ActiveX control is prone to multiple denial-of-service vulnerabilities.

A successful attack allows an attacker to crash the application using the affected control (typically Internet Explorer), causing denial-of-service conditions. The attacker may also be able to run arbitrary code, but this has not been confirmed.

These issues are reported to affect 'EasySetupInt.dll' 14.0.4.30167; other versions may also be affected.

4. Acritum Femitter Server Remote File Disclosure Vulnerability
BugTraq ID: 34689
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34689
Summary:
Acritum Femitter Server is prone to a remote file-disclosure vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to view local files in the context of the server process. This may aid in further attacks.

Acritum Femitter Server 0.96 and 1.03 are affected; other versions may be vulnerable as well.

5. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability
BugTraq ID: 34681
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34681
Summary:
Xitami HTTP server is prone to a denial-of-service vulnerability because it fails to adequately handle multiple socket requests.

Attackers can exploit this issue to crash the affected application, denying service to legitimate users.

Xitami 5.0 is vulnerable; other versions may also be affected.

6. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability
BugTraq ID: 34667
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34667
Summary:
Sun Java Runtime Environment (JRE) is prone to an unspecified security vulnerability that allows attackers to execute arbitrary code.

Attackers can exploit this issue to execute arbitrary code in the context of the application,

JRE 6 Update 1 and 2 are vulnerable.

7. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability
BugTraq ID: 34637
Remote: Yes
Date Published: 2009-04-21
Relevant URL: http://www.securityfocus.com/bid/34637
Summary:
Zervit HTTP server is prone to a denial-of-service vulnerability because it fails to adequately sanitize user-supplied input.

Attackers can exploit this issue to crash the affected application, denying service to legitimate users.

Zervit 0.3 is vulnerable; other versions may also be affected.

8. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34621
Remote: Yes
Date Published: 2009-04-20
Relevant URL: http://www.securityfocus.com/bid/34621
Summary:
Groovy Media Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Groovy Media Player 1.1.0 is vulnerable; other versions may also be affected.

9. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34618
Remote: Yes
Date Published: 2009-04-20
Relevant URL: http://www.securityfocus.com/bid/34618
Summary:
The '1by1' program is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

This issue affects 1by1 1.67; other versions may also be affected.

10. Microsoft Windows Media Player WAV File Multiple Denial of Service Vulnerabilities
BugTraq ID: 34587
Remote: Yes
Date Published: 2009-04-17
Relevant URL: http://www.securityfocus.com/bid/34587
Summary:
Microsoft Windows Media Player is prone to multiple denial-of-service vulnerabilities when processing malformed WAV files.

A remote attacker can exploit these issues to cause the affected application to crash, denying service to legitimate users.

11. Microsoft GDI+ Plugin PNG File Infinite Loop Denial of Service Vulnerability
BugTraq ID: 34586
Remote: Yes
Date Published: 2009-04-17
Relevant URL: http://www.securityfocus.com/bid/34586
Summary:
Microsoft GDI+ is prone to a denial-of-service vulnerability when processing a malformed PNG file.

A remote attacker can exploit this issue to cause an infinite loop, which will consume processing resources, denying service to legitimate users.

12. Microsoft Windows Media Player MIDI File Denial of Service Vulnerability
BugTraq ID: 34585
Remote: Yes
Date Published: 2009-04-17
Relevant URL: http://www.securityfocus.com/bid/34585
Summary:
Microsoft Windows Media Player is prone to a denial-of-service vulnerability when processing a malformed MIDI file.

A remote attacker can exploit this issue to cause the affected application to enter an infinite loop, denying service to legitimate users.

13. MagicISO CCD/Cue File Heap Overflow Vulnerability
BugTraq ID: 34574
Remote: Yes
Date Published: 2009-04-16
Relevant URL: http://www.securityfocus.com/bid/34574
Summary:
MagicISO is prone to a heap-overflow vulnerability that may be triggered by a malicious '.ccd' or '.cue' file.

A successful exploit will crash the application. An attacker may also be able to execute arbitrary code in the context of the application, but this has not been confirmed.

14. MiniWeb Source Code Information Disclosure Vulnerability
BugTraq ID: 34565
Remote: Yes
Date Published: 2009-04-16
Relevant URL: http://www.securityfocus.com/bid/34565
Summary:
MiniWeb is prone to a vulnerability that lets attackers access source code because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable computer in the context of the webserver process. Information obtained may aid in further attacks.

We don't know which versions of MiniWeb are affected. We will update this BID when further details are available.

15. MiniWeb Remote Buffer Overflow Vulnerability
BugTraq ID: 34563
Remote: Yes
Date Published: 2009-04-16
Relevant URL: http://www.securityfocus.com/bid/34563
Summary:
MiniWeb is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

16. Elecard AVC HD Player '.xpl' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34560
Remote: Yes
Date Published: 2009-04-16
Relevant URL: http://www.securityfocus.com/bid/34560
Summary:
Elecard AVC HD Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

17. Apollo 'm3u' Playlist File Heap Buffer Overflow Vulnerability
BugTraq ID: 34554
Remote: Yes
Date Published: 2009-04-16
Relevant URL: http://www.securityfocus.com/bid/34554
Summary:
Apollo is prone to a heap-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

Attackers can execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Apollo 37zz is vulnerable; other versions may also be affected.

18. RETIRED: Microsoft Windows Media Player MID File Parsing Integer Overflow Vulnerability
BugTraq ID: 34534
Remote: Yes
Date Published: 2009-04-15
Relevant URL: http://www.securityfocus.com/bid/34534
Summary:
Microsoft Windows Media Player is prone to an integer-overflow vulnerability.

An attacker can exploit this issue by tricking an unsuspecting victim into opening a malicious file with the vulnerable application. A successful exploit will allow the attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.

Windows Media Player 11 is vulnerable; other versions may also be affected.

NOTE: This BID is being retired because exploits of this issue would have no security impact.

19. Microsoft IAG 2007 ActiveX Control Multiple Stack Based Buffer Overflow Vulnerabilities
BugTraq ID: 34532
Remote: Yes
Date Published: 2009-04-15
Relevant URL: http://www.securityfocus.com/bid/34532
Summary:
The Microsoft Intelligent Application Gateway (IAG) 2007 Client Components ActiveX Control is prone to multiple stack-based buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied data. The ActiveX control is identified by CLSID:

8D9563A9-8D5F-459B-87F2-BA842255CB9A

Successfully exploiting these issues allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

NOTE: IAG was formerly known as Whale Communications Intelligent Application Gateway.

Versions prior to IAG 2007 3.7 SP2 are vulnerable.

20. Zervit 'http.c' Remote Buffer Overflow Vulnerability
BugTraq ID: 34530
Remote: Yes
Date Published: 2009-04-15
Relevant URL: http://www.securityfocus.com/bid/34530
Summary:
Zervit is prone to a remote buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Zervit 0.2 is vulnerable; other versions may also be affected.

21. Mini-stream Software RM-MP3 Converter '.pls' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34514
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34514
Summary:
Mini-stream Software RM-MP3 Converter is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate checks on user-supplied input.

Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

22. Microsoft WordPad Word 97 Converter Remote Code Execution Vulnerability
BugTraq ID: 34470
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34470
Summary:
Microsoft WordPad is prone to a remote code-execution vulnerability because of a stack-based buffer overflow that may result in corrupted memory.

An attacker could exploit this issue to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts may result in denial-of-service conditions.

23. Microsoft Word 2000 WordPerfect Converter Remote Code Execution Vulnerability
BugTraq ID: 34469
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34469
Summary:
Microsoft Word 2000 is prone to a remote code-execution vulnerability because it fails to properly validate an unspecified string when parsing a WordPerfect document.

An attacker could exploit this issue to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts may result in denial-of-service conditions.

24. Microsoft DirectX DirectShow MJPEG Video Decompression Remote Code Execution Vulnerability
BugTraq ID: 34460
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34460
Summary:
Microsoft DirectX is prone to a remote code-execution vulnerability because the DirectShow component fails to properly handle compressed media files.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

25. Microsoft Windows Thread Pool ACL Local Privilege Escalation Vulnerability
BugTraq ID: 34444
Remote: No
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34444
Summary:
Microsoft Windows is prone to a privilege-escalation vulnerability.

Successful exploits may allow attackers to elevate their privileges to LocalSystem, which would facilitate the complete compromise of affected computers.

The issue affects the following:

Windows Vista
Windows Server 2008

26. Microsoft Windows RPCSS Service Isolation Local Privilege Escalation Vulnerability
BugTraq ID: 34443
Remote: No
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34443
Summary:
Microsoft Windows is prone to a privilege-escalation vulnerability.

Successful exploits may allow attackers to elevate their privileges to LocalSystem, which would facilitate the complete compromise of affected computers.

The issue affects the following:

Windows XP SP2
Windows Server 2003

27. Microsoft Windows WMI Service Isolation Local Privilege Escalation Vulnerability
BugTraq ID: 34442
Remote: No
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34442
Summary:
Microsoft Windows is prone to a privilege-escalation vulnerability.

Successful exploits may allow attackers to elevate their privileges to LocalSystem, which would facilitate the complete compromise of affected computers.

The issue affects the following:

Windows XP SP2
Windows Server 2003
Windows Vista
Windows Server 2008

28. Microsoft Windows NTLM Credential Reflection Remote Code Execution Vulnerability
BugTraq ID: 34439
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34439
Summary:
Microsoft Windows is prone to a vulnerability that could let attackers replay NTLM (NT LAN Manager) credentials. A successful exploit would let an attacker execute arbitrary code in the context of the affected user.

29. Microsoft Internet Explorer Page Transition Remote Code Execution Vulnerability
BugTraq ID: 34438
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34438
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks will cause denial-of-service conditions.

30. Microsoft WinHTTP Server Name Mismatch Certificate Validation Security Bypass Vulnerability
BugTraq ID: 34437
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34437
Summary:
Microsoft Windows HTTP Services (WinHTTP) is prone to a security-bypass vulnerability because of an error in verifying website certificates.

Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks.

31. Microsoft WinHTTP Integer Underflow Memory Corruption Remote Code Execution Vulnerability
BugTraq ID: 34435
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34435
Summary:
Microsoft Windows HTTP Services (WinHTTP) is prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise an affected application and possibly the computer. Failed attacks will cause denial-of-service conditions.

32. Microsoft Internet Explorer Marquee Tag Handling Remote Code Execution Vulnerability
BugTraq ID: 34426
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34426
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.

33. Microsoft Internet Explorer 'EMBED' Tag Uninitialized Memory Remote Code Execution Vulnerability
BugTraq ID: 34424
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34424
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.

34. Microsoft Internet Explorer Uninitialized Memory Variant One Remote Code Execution Vulnerability
BugTraq ID: 34423
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34423
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.

35. Microsoft ISA Server and Forefront Threat Management Gateway Cross-Site Scripting Vulnerability
BugTraq ID: 34416
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34416
Summary:
Microsoft ISA (Internet Security and Acceleration) Server and Forefront Threat Management Gateway (TMG) are prone to a cross-site scripting vulnerability because the software fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal potentially sensitive information and launch other attacks.

36. Microsoft ISA Server and Forefront Threat Management Gateway Denial of Service Vulnerability
BugTraq ID: 34414
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34414
Summary:
Microsoft ISA Server and Forefront Threat Management Gateway are prone to a remote denial-of-service vulnerability.

A remote, anonymous attacker could exploit this issue to cause the Web proxy listener to become unresponsive, denying service legitimate users.

37. Microsoft Excel Malformed Object Remote Memory Corruption Vulnerability
BugTraq ID: 34413
Remote: Yes
Date Published: 2009-04-14
Relevant URL: http://www.securityfocus.com/bid/34413
Summary:
Microsoft Excel is prone to a memory-corruption vulnerability.

Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file.

Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #440
http://www.securityfocus.com/archive/88/502793

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Webex

Desktop Security On Demand

Today, the pressures of technology threats, regulatory compliance, and cost control have combined to force a renewed focus on corporate IT management. As a result, security and system management are top-of-mind considerations for IT managers within businesses of all sizes. Learn more today!

http://dinclinx.com/Redirect.aspx?36;4905;35;189;0;3;259;0e72602f272b1d7
e

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus