Security Patch Watch: Apple, Nortel, Symantec

 
 
By Ryan Naraine  |  Posted 2005-06-01 Email Print this article Print
 
 
 
 
 
 
 

Security fixes have been released for vulnerabilities in Symantec's Brightmail AntiSpam, Apple's QuickTime media player and Nortel VPN routers.

Network security vendor Symantec has released a patch to fix a security flaw in its enterprise-facing Brightmail AntiSpam software.

In a published advisory, Symantec Corp. warned that the flaw can be exploited by malicious hackers to bypass security restrictions.

Affected software includes Symantec Brightmail AntiSpam 4.x through 6.x.
Security alerts aggregator Secunia rates the bug as "moderately critical" and urged Brightmail AntiSpam users to upgrade to version 6.0.2 through the Symantec Support Web site.

Symantec said the vulnerability is caused due to a static database administration password, which can be exploited to gain administrative access to the database containing quarantined messages for review.

Apple Patches QuickTime Vulnerability

Apple Computer Inc. has updated its flagship QuickTime media player to correct a security flaw that could be exploited to hijack sensitive data.

An alert from Apple contains instructions on updating to QuickTime 7.0.1 to fix the bug.

"With QuickTime 7.0, a QuickTime movie containing a maliciously crafted Quartz Composer object can leak data to an arbitrary Web location," the company warned.

Apple said a Quartz Composer object can gather local data and send it using an encoded URL to an arbitrary Web location. With the update, the software modifies the QuickTime Quartz Composer Plugin to prevent access to remote Web locations.

Moderately Critical Bug in Nortel VPN Routers

Nortel Networks Corp. on Wednesday issued an alert for a denial-of-service vulnerability in the Nortel VPN Router products, previously known as Nortel Contivity.

"We believe that this is a serious vulnerability, because a single malformed IKE packet causes the VPN router to crash. Also it is not normally possible to prevent the malformed packet from reaching the router," the company said in an advisory.

The vulnerability has been reported in the 600, 1010, 1050, 1100, 1600, 1700, 1740, 2600, 2700, 4500, 4600, and 5000 models.

Nortel recommended that users update to version 5.05.200 or install patched version of 4.76, 4.85, 4.90, or 5.00, which are expected to ship in a few weeks.

Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel