The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.
Adobe has released a blog entry addressing a vulnerability in Acrobat and Reader. This vulnerability exists due to the way in which Adobe Acrobat and Adobe Reader handle launch actions embedded in PDFs. When users open a PDF that contains a launch action, they are presented with a dialog box warning the user that a file and its viewer application are set to be launched by the PDF file. The dialog box asks users if they want to continue opening the file and displays the name of the file to be opened. An attacker may be able to manipulate the content in the file name section of the dialog box in an attempt to convince users to open the file. By default, the dialog is set to select the option to continue opening the file. This default configuration and the option to disable the warning message for future launch actions makes it very easy for users to bypass this security mechanism. Opening a PDF containing malicious launch actions may result in arbitrary code execution.
The Foxit Corporation has released Foxit Reader 3.2.1.0401 to address a critical vulnerability. Exploitation of this vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.
US-CERT encourages users and administrators to review the Foxit notice regarding the release and upgrade to Foxit Reader 3.2.1.0401 to help mitigate the risks. Additional information regarding this vulnerability can be found in the Vulnerability Notes Database.
The Mozilla Foundation has released Firefox V3.6.3 to address a critical vulnerability. Exploitation of this vulnerability may allow an attacker to execute arbitrary code.
US-CERT encourages users and administrators to review Mozilla Foundation Security Advisory mfsa2010-25 and upgrade to Firefox V3.6.3.
VMware has released a security advisory to address vulnerabilities in the Samba and acpid packages of ESX Service Console. These vulnerabilities may allow an attacker to cause a denial-of-service condition, obtain sensitive information or bypass security restrictions.
US-CERT encourages users and administrators to review VMware security bulletin VMSA-2010-0006 and apply any necessary updates to help mitigate the risks.
Oracle has released a critical patch update to address 27 vulnerabilities in Java SE and Java for Business. These vulnerabilities are in the following components: ImageIO, Java 2D, Java Runtime Environment, Java Web Start, Pack200, Sound, JSSE, and HotSpot Server.
US-CERT encourages users and administrators to review the critical patch update and apply any necessary updates to help mitigate the risks.
Microsoft has released an update to its Security Bulletin Summary for March 2010 and has included the out-of-band bulletin MS10-018. This bulletin addresses ten vulnerabilities in Internet Explorer, including one previously announced in Microsoft Security Advisory 981374. The most severe of these vulnerabilities may allow an attacker to execute arbitrary code on the affected system.
US-CERT encourages users and administrators to review Microsoft Security Bulletin MS10-018 and to follow best-practice security policies to determine which updates should be applied.