Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Patch Update Addresses 12 Critical Vulnerabilities

Symantec : 12 August, 2010  (Technical Article)
Large bulletin release from Microsoft represents a record number of vulnerabilities being addressed in a single month with 34 of which 12 are critical
Microsoft has issued 14 security bulletins which address 34 vulnerabilities, 12 of which Microsoft has rated as critical. This represents a record number of bulletins issued in a single month, and ties the record for total vulnerabilities addressed.

"The SMB pool overflow vulnerability should be a real concern for enterprises," said Joshua Talbot, security intelligence manager, Symantec Security Response. "Not only does it give an attacker system-level access to a compromised SMB server, but the vulnerability occurs before authentication is required from computers contacting the server. This means any system allowing remote access and not protected by a firewall is at risk."

"Best practices dictate that file or print sharing services, such as SMB servers, should not be open to the Internet," Talbot added. "But such services are often unprotected from neighboring systems on local networks. So, a cybercriminal could use a multi-staged attack to exploit this vulnerability. Such an attack would likely start by compromising an employee's machine via a drive-by download or socially engineered email, and would end by using that compromised computer to attack neighboring machines on the same local network that have the SMB service running."

"This issue affects more than just file servers using the SMB service," Talbot concluded. "Workstations that have enabled file and print sharing are also at risk. Laptops with this configuration that connect to untrusted networks, such as public Wi-Fi, or that allow ad hoc connections could be attacked by neighboring computers. The user could then unwittingly carry their infected system back to the enterprise, opening the door to an organization's entire network."

Symantec strongly encourages users to patch their systems against all vulnerabilities addressed this month.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo