Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Same day protection against MS vulnerabilities

Sourcefire : 14 November, 2008  (New Product)
Sourcefire customers receive same day protection against vulnerabilities announced by Microsoft on patch Tuesday
Open source innovator and Snort creator, Sourcefire has announced that the Sourcefire Vulnerability Research Team (VRT) has delivered rules to protect Sourcefire customers and Snort users from the two Microsoft vulnerabilities disclosed today. These vulnerabilities impact Microsoft Windows and Microsoft Office.

"While the number of vulnerabilities announced this month are relatively small, they can have significant impact on users' networks, which underscores the need for organizations to proactively secure their systems," said Matt Watchinski, Senior Director of the Sourcefire Vulnerability Research Team. "Sourcefire's participation in the Microsoft Active Protections Program (MAPP) helps us to quickly deliver protection for the latest threats, so that our customers receive the best possible protection."

The Sourcefire VRT created, tested and delivered Snort rules designed to detect attacks targeting the Microsoft vulnerabilities listed below. These new rules are included in the latest Sourcefire Security Enhancement Update (SEU) released today.

- Microsoft Security Bulletin MS08-068 - Vulnerability in Microsoft Server Message Block (SMB) Protocol could allow remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

- Microsoft Security Bulletin MS08-069 - Multiple vulnerabilities exist in Microsoft XML Core Services, the most serious of which could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo