Dali mi moze neko pomoc u vezi ovog:
Secunia ID SA16137
Release Date 21 Jul 2005
Software zlib 1.x
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact DoS (Denial of Service)
This includes vulnerabilities ranging from excessive resource consumption (e.g. causing a system to use a lot of memory) to crashing an application or an entire system.
Description Markus Oberhumer has reported a vulnerability in zlib, which can be exploited by malicious people to cause a DoS (Denial of Service) against a vulnerable application.
The vulnerability is caused due to the insufficient size of the code table declared in inflate.h, and can be exploited to cause an application using the zlib library to crash via a specially crafted input file.
The vulnerability has been reported in version 1.2.2. Prior versions may also be affected.
Solution Update to version 1.2.3.
Reported by Markus Oberhumer
Microsoft Word Two Code Execution Vulnerabilities
Secunia ID SA30143
CVE-ID CVE-2008-1091, CVE-2008-1434
Release Date 13 May 2008
Last Change 14 May 2008
Criticality Highly Critical
Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction but there are no known exploits available at the time of disclosure.
Such vulnerabilities can exist in services like FTP, HTTP, and SMTP or in client systems like email programs or browsers.
Solution Status Vendor Patch
Software Microsoft Office 2000
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office 2007
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Word 2007
Microsoft Office XP
Microsoft Word 2000
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word Viewer 2003
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact System access
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Description Two vulnerabilities have been reported in Microsoft Word, which can be exploited by malicious people to compromise a user's system.
1) An error when parsing objects in rich text format (.rtf) files can be exploited to cause a heap-based buffer overflow e.g. when a user opens a specially crafted .rtf file containing malformed strings with Word or previews a specially crafted e-mail containing malformed strings as rich text or HTML.
2) An error exists in the processing of cascading style sheets (CSS) values and can be exploited to corrupt memory when a specially crafted HTML file is opened using Word.
Successful exploitation may allow execution of arbitrary code
Microsoft Excel Multiple Code Execution Vulnerabilities
Secunia ID SA28506
CVE-ID CVE-2008-0081, CVE-2008-0111, CVE-2008-0112, CVE-2008-0114, CVE-2008-0115, CVE-2008-0116, CVE-2008-0117
Release Date 16 Jan 2008
Last Change 14 Mar 2008
Criticality Extremely Critical
Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild.
These vulnerabilities can exist in services like FTP, HTTP, and SMTP or in certain client systems like email programs or browsers.
Solution Status Vendor Patch
Software Microsoft Excel 2000
Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Excel Viewer 2003
Microsoft Office 2000
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office 2007
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Excel 2007
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact System access
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Description Multiple vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system.
1) An error in the handling of macros can be exploited via a specially crafted Excel file to execute arbitrary code.
NOTE: According to Microsoft, this vulnerability is currently being actively exploited.
2) An error when processing data validation (DVAL) records can be exploited to corrupt memory via a specially crafted Excel file.
3) An error when importing files into Excel can be exploited via a specially crafted .slk file.
4) An error in the handling of style records can be exploited to corrupt memory via a specially crafted Excel file.
5) An error in the parsing of formulas can be exploited to corrupt memory via a specially crafted Excel file.
6) An error in the handling of rich text values can be exploited via a specially crafted Excel file.
7) An error in the handling of conditional formatting values can be exploited via a specially crafted Excel file.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Secunia ID SA16137
Release Date 21 Jul 2005
Software zlib 1.x
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact DoS (Denial of Service)
This includes vulnerabilities ranging from excessive resource consumption (e.g. causing a system to use a lot of memory) to crashing an application or an entire system.
Description Markus Oberhumer has reported a vulnerability in zlib, which can be exploited by malicious people to cause a DoS (Denial of Service) against a vulnerable application.
The vulnerability is caused due to the insufficient size of the code table declared in inflate.h, and can be exploited to cause an application using the zlib library to crash via a specially crafted input file.
The vulnerability has been reported in version 1.2.2. Prior versions may also be affected.
Solution Update to version 1.2.3.
Reported by Markus Oberhumer
Microsoft Word Two Code Execution Vulnerabilities
Secunia ID SA30143
CVE-ID CVE-2008-1091, CVE-2008-1434
Release Date 13 May 2008
Last Change 14 May 2008
Criticality Highly Critical
Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction but there are no known exploits available at the time of disclosure.
Such vulnerabilities can exist in services like FTP, HTTP, and SMTP or in client systems like email programs or browsers.
Solution Status Vendor Patch
Software Microsoft Office 2000
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office 2007
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Word 2007
Microsoft Office XP
Microsoft Word 2000
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word Viewer 2003
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact System access
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Description Two vulnerabilities have been reported in Microsoft Word, which can be exploited by malicious people to compromise a user's system.
1) An error when parsing objects in rich text format (.rtf) files can be exploited to cause a heap-based buffer overflow e.g. when a user opens a specially crafted .rtf file containing malformed strings with Word or previews a specially crafted e-mail containing malformed strings as rich text or HTML.
2) An error exists in the processing of cascading style sheets (CSS) values and can be exploited to corrupt memory when a specially crafted HTML file is opened using Word.
Successful exploitation may allow execution of arbitrary code
Microsoft Excel Multiple Code Execution Vulnerabilities
Secunia ID SA28506
CVE-ID CVE-2008-0081, CVE-2008-0111, CVE-2008-0112, CVE-2008-0114, CVE-2008-0115, CVE-2008-0116, CVE-2008-0117
Release Date 16 Jan 2008
Last Change 14 Mar 2008
Criticality Extremely Critical
Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild.
These vulnerabilities can exist in services like FTP, HTTP, and SMTP or in certain client systems like email programs or browsers.
Solution Status Vendor Patch
Software Microsoft Excel 2000
Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Excel Viewer 2003
Microsoft Office 2000
Microsoft Office 2003 Professional Edition
Microsoft Office 2003 Small Business Edition
Microsoft Office 2003 Standard Edition
Microsoft Office 2003 Student and Teacher Edition
Microsoft Office 2004 for Mac
Microsoft Office 2007
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
Microsoft Office Excel 2007
Where From remote
"From remote" describes other vulnerabilities where the attack vector doesn't require access to the system or a local network.
This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.
Impact System access
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Description Multiple vulnerabilities have been reported in Microsoft Excel, which can be exploited by malicious people to compromise a user's system.
1) An error in the handling of macros can be exploited via a specially crafted Excel file to execute arbitrary code.
NOTE: According to Microsoft, this vulnerability is currently being actively exploited.
2) An error when processing data validation (DVAL) records can be exploited to corrupt memory via a specially crafted Excel file.
3) An error when importing files into Excel can be exploited via a specially crafted .slk file.
4) An error in the handling of style records can be exploited to corrupt memory via a specially crafted Excel file.
5) An error in the parsing of formulas can be exploited to corrupt memory via a specially crafted Excel file.
6) An error in the handling of rich text values can be exploited via a specially crafted Excel file.
7) An error in the handling of conditional formatting values can be exploited via a specially crafted Excel file.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Virusi koje je pronasao su: Win32/PolyCrypt, HTML/Framer. AK i JS/Psyme. Sva tri se nalaze na lokaciji C/Documents and settings/Local settings/Teporary Internet files. Problem je sto, kada udjem u Documents and settings, ne postoji folder Local settings. Gde to moze da bude smesteno
, i koliko su opasni ovi virusi? Da li je dovoljno baciti ih u karantin, ukoliko nece da se obrisu?:???:


