Your daily technology class with Professor Randy!!

Randy The Tech Professor

July 31, 2014 at 10:26 pm

Third Party Program Updates For The Month Of July 2014

patch 3rd. party softwareHello everyone,

It is not enough anymore to just keep your Operating System updated and patched. Many third party (non Microsoft) programs need constant updating also. If these programs are left unpatched, your system is wide open to attack. Most of the malware attacks that I see in my computer repair business are due to outdated versions of third party applications like the ones shown below. Please take a look at the July 2014 third party updates, and get the most recent versions as soon as you can. A great automatic third party updater can be found here.

Identifier Vendor/ Product Product Version Affected/ Date Released by Vendor/ Vulnerability Info Vendor Severity / Recommendation

CPU 7/14 / Oracle Java SE Java SE 8u5 and earlier,
SE 7u60 and earlier,
SE 6u75 and earlier,
SE 5.0u65 and earlier 7/15/2014 Arbitrary Code Execution Critical: Upgrade to latest release

APSB14-17 / Adobe Flash Player Windows/Mac 14.0.0.145 Linux 11.2.202.394 7/8/2014 Arbitrary Code Execution Critical: Priority 1/ Upgrade within 72 hours

APSB14-17 / Adobe Air Windows/Mac 14.0.0.137 7/8/2014 Arbitrary Code Execution Critical: Priority 3/ Upgrade at admin’s discretion

36.0.1985.125 / Google Chrome Windows/Linux/Mac before 36.0.1985.125 7/16/2014 Denial of Service, Security Bypass Upgrade at admin’s discretion

31/ESR 24.7 / Mozilla Firefox Before 31/ESR 24.7 7/22/2014 Arbitrary Code Execution, Denial of Service, Security Bypass, Recommended: Upgrade after testing

31/ESR 24.7 / Mozilla Thunderbird Before 31/ESR 24.7 7/22/2014 Arbitrary Code Execution, Denial of Service, Security Bypass Recommended: Upgrade after testing

17.0.10.8 / Real Player Windows before 17.0.10.8
Mac before 12.0.1.1738 6/27/2014 Arbitrary Code Execution Recommended: Upgrade after testing

Best wishes,
Randy Knowles

 

Tags: , ,
-

 

RSS feed for comments on this post | TrackBack URI