Microsoft Security Bulletin for April 2007

This months security patch consists update for Windows CSRSS, Microsoft Content Management Server, Universal Plug and Play, Microsoft Agent and the most widely exploited vulnerability in last few weeks ANI file (Vulnerabilities in GDI Could Allow Remote Code Execution). All the users and reader are requested to apply this patch. for more information https://www.microsoft.com/technet/security/bulletin/ms07-apr.mspx

Microsoft Release Patch for ANI file exploit

https://www.microsoft.com/technet/security/Bulletin/MS07-017.mspx This update is posted earlier to the usual second Tuesday monthly Security Release because of the alarming increase of Malwares and sites exploiting the ANI vulnerability. All users and reader are requested to apply this patch.

Animated cursor exploited

Microsoft issued a Security Advisory about targeted attacks exploiting a vulnerability in the way Windows handles animated cursor (.ani) files. More Info at Microsoft Security Advisory We have reports of ANI file exploited and hosted on some of the sites. Added the detection of vulnerable ANI files as Exploit.MS05-002 in today’s update (30-03-2007) In order […]

Brand Equity Quiz kick off

Quick Heal is one of the National Sponsor for Brand Equity Quiz 2007. Pune regional round was held on Saturday. Bhatkuli and D’Silva won the quiz and now will represent Pune region at the finals to be held in Mumbai. Our CEO Mr. Kailash Katkar handed prizes to thrid and fourth runner up. Click here […]

Updates for February

Microsoft monthly updates for Feburary has been released. It includes 6 Critical patches and 6 important patches. Most of vulernabilities in critical and important section could allow remote code execution, so it’s very important to patch your systems. More infomation on the patches released on Microsoft Security Updates Happy Valentines Day!

Applause to Chinese Police

Chinese Police authorities have arrested eight suspects involved in producing and spreading a severe computer virus. The virus W32.Viking (also known as Worm.Fujacks) made headlines last month because it converts icons of infected programs into a picture of a panda burning joss-sticks as it stole usernames and passwords from on-line games players. Li Jun one […]

Vulnerability in Sun Solaris Telnet Daemon

Authentication bypass vulnerability in the Sun Solaris telnet daemon (in.telnetd) has been discovered. The Sun Solaris telnet daemon does not properly parse the USER Environment variable before passing it to the login process. By supplying a specially crafted USER Environment variable over telnet, a remote attacker may be able to bypass authentication to gain access […]

Windows Vista bagged

Quick Heal acclaimed 17th VB 100% award We are happy to announce that Quick Heal 2007 received VB100 % on Windows Vista Business Edition (32-bit). This test was the first test performed on Windows Vista for this year and we passed on first attempt. In total 15 Anti-Virus products were tested out of which 4 […]

CVE-2007-0515 exploit targeted attack

Another Microsoft Word zero-day vulnerability has been discovered the fourth in two months. The flaw can be exploited by hacker to execute arbitrary code on the compromised system. An attacker could exploit this vulernabilitiy by enciting a user to open a malicous word file which could be located on a remote system (URL) or in […]

postcard

We are seeing again seeding of mails containing new variant of Warezov family. The attachments names could be as below postcard.exe postcard.zip message.msg.exe file.eml.scr It downloads additional components from ertikadeswiokinganfujas.com domain, which is active. more info will be posted soon, at present we have released an outbreak update.