Monthly Archives: December 2009

Mozilla Firefox 3.5.6 Released

Mozilla Firefox 3.5.6 has been released to fix a number of security issues in 3.5.5.

  • MFSA 2009-71 GeckoActiveXObject exception messages can be used to enumerate installed COM objects
  • MFSA 2009-70 Privilege escalation via chrome window.opener
  • MFSA 2009-69 Location bar spoofing vulnerabilities
  • MFSA 2009-68 NTLM reflection vulnerability
  • MFSA 2009-67 Integer overflow, crash in libtheora video library
  • MFSA 2009-66 Memory safety fixes in liboggplay media library
  • MFSA 2009-65 Crashes with evidence of memory corruption (rv:1.9.1.6/ 1.9.0.16)

Security Advisories for Firefox 3.5

Sweet Home 3D

Sweet Home 3D is a free interior design application that helps you place your furniture on a house 2D plan, with a 3D preview, and I must say it’s bloody awesome. I found it after reading about it on a blog called The Telarah Times. Now if only I had the time to draw up some plans to use in it.

I might find the time when I’m on Holiday over Christmas could be something fun to do.

Sweet Home 3D is available for Windows, Mac OSX, and Linux, you can download it here.

Microsoft Security Bulletin Summary for December 2009

Microsoft have released updates for the month.

  • Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318)
  • Vulnerability in Microsoft Office Project Could Allow Remote Code Execution (967183)
  • Cumulative Security Update for Internet Explorer (976325)
  • Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service (974392)
  • Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution (971726)
  • Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution (975539)

Microsoft Security Bulletin Summary for December 2009

How to Block Wallpaper Changing via Group Policy

So one of the things that pisses you off if your an admin is people changing the desktop image on computers even though you have set all the options to stop it. Well it turns out that even if you disable access to the settings you can still use a browser to change the image.

The best solution for this is to go into a group policy “User Config\Administrative Templates\Desktop\Active Desktop\Active Desktop Wallpaper” and set it to a non-valid image file. (Something none existent another words)

This should be all that needs to be done, even if the user changes the image next time they logon it’s goon again.

Removing Windows Wallpaper on 2000 and XP machines?