This guide describes how you can automatically scan files uploaded by users through a web form on your server using PHP and ClamAV. That way you can make sure that your upload form will not be abused to distribute malware. To glue PHP and ClamAV, we install the package php5-clamavlib/php4-clamavlib which is rather undocumented at this time. That package is available for Debian Etch and Sid and also for Ubuntu Dapper Drake and Edgy Eft.
iDefense Lab security researchers discovered that the expressions computing the parameters for ALLOCATE_LOCAL() in those functions are using client-provided value in an expression that is subject to integer overflows, which could lead to memory corruption. All X.Org X server version implementing the X render and dbe extensions are vulnerable.
Opera Software may well be putting its browser users at risk by not properly disclosing security vulnerabilities to vulnerable users. At least that's the allegation made by Mozilla Corp.'s Asa Dotzler.
Recently, some of our users have asked why we chose to disclose a potential security issue only after the release of Opera 9.10. Let me try to give a short overview on how security issues get reported and disclosed - and not only at Opera, but in most applications: it might help some people to understand how this works.
The Month of Apple Bugs has turned up another cross-platform issue - this time one that affects Windows, Linux and potentially other operating systems in addition to Mac OS X.
A patch has been widely released for a vulnerability in the OpenOffice.org productivity suite, a problem rated as "highly critical" by one security vendor.
Some vulnerabilities have been reported within the Linux kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).
When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. A more efficient approach is to configure a system securely from the start.
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox.