Your daily technology class with Professor Randy!!

Randy The Tech Professor

May 1, 2015 at 5:37 pm

Third Party Program Updates For The Month Of April 2015

java exploit

 

Hello everyone,

Vulnerabilities in third party apps are being exploited like never before. The bad guys have turned away from the Microsoft Operating System (patch Tuesday isn’t perfect but is good enough to force the many exploits in 3rd. party programs). The existence of these third party vendors (Adobe, Oracle, Apple, etc.) is not threatened, so they will never perfect a patching strategy the way Microsoft did. Heck, their so called “automatic updates” don’t even work!

So, get updated as soon as possible. Here are your April 2015 third party program patches:

Key: 1) Identifier 2) Vendor/Product 3) Product Version Affected 4) Date Released by Vendor 5) Vulnerability Info 6) Severity/Recommendation

APSB15-06
Adobe Flash Win/MAC
before 17.0.0.169 / ESR 13.0.0.281 Linux before 11.2.202.457
4/14/2015
Arbitrary Code Execution
Critical: Priority 1/ Upgrade within 72 hours

APSB15-07
Adobe ColdFusion
Version 11 before Update 5 Version 10 before update 6
4/14/2015
Cross Site Scripting
Important: Priority 2/ Upgrade within 30 days

APSB15-08
Adobe Flex
4.6 and earlier
4/14/2015
Cross Site Scripting
Important: Priority 3/ Update at the administrator’s discretion

8.0.5/7.1.5/6.2.5
Apple Safari
Before 8.0.5/7.1.5/6.2.5
4/8/2015
Arbitrary Code Execution, Denial of Service, Security Bypass, Information Disclosure
Update as soon as possible

42.0.2311.90
Google Chrome
Before 42.0.2311.90
4/14/2015
Denial of Service, Security bypass, Information Disclosure
Update at admin’s discretion.

37.0.2
Mozilla Firefox
Before 37.0.2
4/20/2015
Arbitrary Code Execution, Denial of Service, Security Bypass, Spoofing
Update as soon as possible

April
CPU Java
Java SE 5.0u81, Java SE 6u91, Java SE 7u76, Java SE 8u40
4/15/2015
Arbitrary Code Execution, Security Bypass
Update as soon as possible

Best wishes,
Randy The Tech Professor

Tags: , ,
-
6

 

RSS feed for comments on this post | TrackBack URI