Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

2014-07-28 Thread Gynvael Coldwind
So reading the links you provided I semi-agree with you. I think the problem boils down to this part of your initial e-mail: PS: yes, it needs administrative privileges to write C:\Program.exe. BUT: all the user account(s) created during Windows setup have administrative privileges. My

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

2014-07-28 Thread Stefan Kanthak
Gynvael Coldwind wrote: So reading the links you provided I semi-agree with you. I think the problem boils down to this part of your initial e-mail: PS: yes, it needs administrative privileges to write C:\Program.exe. BUT: all the user account(s) created during Windows setup have

Web Encryption Extension security update

2014-07-28 Thread Ralf Senderek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Revision: 1.0 Last Updated: 25 July 2014 First Published: 25 July 2014 Summary: A security issue was found in the Web Encryption Extension. Authenticated users are able to modify the content of https request

[security bulletin] HPSBGN02936 rev.1 - HP and H3C VPN Firewall Module Products, Remote Denial of Service (DoS)

2014-07-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03993467 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03993467 Version: 1 HPSBGN02936

[SECURITY] [DSA 2990-1] cups security update

2014-07-28 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2990-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso July 27, 2014

[SECURITY] [DSA 2991-1] modsecurity-apache security update

2014-07-28 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2991-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso July 27, 2014

Barracuda Networks SpamVirus Firewall v5.1.3 - Client Side Cross Site Vulnerability

2014-07-28 Thread Vulnerability Lab
Document Title: === Barracuda Networks SpamVirus Firewall v5.1.3 - Client Side Cross Site Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1118 Barracuda Networks Security ID (BNSEC): BNSEC-1052