Your daily technology class with Professor Randy!!

Randy The Tech Professor

January 26th, 2015 at 10:05 pm

Third Party Program Updates For The Month Of January 2015

adobe flash

 

Hello everyone,

It’s just not enough to keep your Operating System patched. Most malicious exploits are finding entrance into your machine through third party programs. Below are the January 2015 third party patches. Get updated as soon as possible!

Key: 1) Identifier 2) Vendor/Product 3) Product Version Affected 4) Date Released by Vendor 5) Vulnerability Info 6) Severity/Recommendation

APSB15-01
Adobe Flash
Win/Mac before 16.0.0.257
1/13/2015
Arbitrary Code Execution
Critical: Priority 1/ Upgrade within 72 hours

APSB15-01
Adobe Air
Win/Mac before 16.0.0.245
1/13/2015
Arbitrary Code Execution
Critical: Priority 3/ Upgrade at administrators discretion

APSB15-02
Adobe Flash
Win/Mac before 16.0.0.287, Linux before 11.2.202.438
1/22/2015
Security Bypass
Update as soon as possible

Oracle CPU January 2015
Java
Java SE 5.0u75, Java SE 6u85, Java SE 7u72, Java SE 8u25
1/20/2015
Arbitrary Code Execution
Update as soon as possible

40.0.2214.91
Google Chrome
Win/Mac/Linux before 40.0.2214.91
1/21/2015
Denial of Service, Spoofing, Security Bypass,
Update after testing

35/ESR 31.4
Mozilla Firefox
Before 35/ESR 31.4
1/13/2015
Arbitrary Code Execution, Privilege Escalation, Security Bypass, Denial of Service, Cross-Site Request Forgery, Data Leak
Update after testing

2.32
Mozilla Seamonkey
Before 2.32
1/13/2015
Privilege Escalation, Security Bypass, Denial of Service, Cross-Site Request Forgery, Data Leak
Update after testing

31.4
Mozilla Thunderbird
Before 31.4
1/13/2015
Security Bypass, Cross-Site Request Forgery
Update after testing

Best wishes,
Randy The Tech Professor

 

Tags: , ,
-
7

 

RSS feed for comments on this post | TrackBack URI