U.S. Flag Official website of the Department of Homeland Security

The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.

VMware Releases Security Advisory VMSA-2010-0007

VMware has released security advisory VMSA-2010-0007 to address multiple vulnerabilities in VMware hosted products, vCENTER Server and ESX. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code, operate with elevated privileges, obtain sensitive information, or cause a denial-of-service condition.

US-CERT encourages users and administrators to review VMware security advisory VMSA-2010-0007 and apply any necessary updates to help mitigate the risks.

Microsoft Releases Advance Notification for April Security Bulletin

Microsoft has issued a Security Bulletin Advance Notification, indicating that its April release cycle will contain 11 bulletins. Five of them will have the severity rating of critical and will be for Microsoft Windows. The remaining six bulletins will have the severity rating of important or moderate and will be for Microsoft Windows, Office, and Exchange. Release of these bulletins is scheduled for Tuesday, April 13, 2010.

US-CERT will provide additional information as it becomes available.

Adobe Releases Guidance for Launch Functionality Mitigation in Acrobat and Reader

Adobe has released a blog entry addressing a vulnerability in Acrobat and Reader. This vulnerability exists due to the way in which Adobe Acrobat and Adobe Reader handle launch actions embedded in PDFs. When users open a PDF that contains a launch action, they are presented with a dialog box warning the user that a file and its viewer application are set to be launched by the PDF file. The dialog box asks users if they want to continue opening the file and displays the name of the file to be opened. An attacker may be able to manipulate the content in the file name section of the dialog box in an attempt to convince users to open the file. By default, the dialog is set to select the option to continue opening the file. This default configuration and the option to disable the warning message for future launch actions makes it very easy for users to bypass this security mechanism. Opening a PDF containing malicious launch actions may result in arbitrary code execution.


This product is provided subject to this Notification and this Privacy & Use policy.

Back to Top