Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Sourcefire closes out latest MS vulnerabilities

Sourcefire : 18 June, 2008  (Technical Article)
Vulnerability research team generates rules for protection in line with latest security bulletins issued by Microsoft
Open source innovator and Snort creator, Sourcefire has announced that the Sourcefire Vulnerability Research Team (VRT) has delivered rules to protect Sourcefire customers and Snort users from six Microsoft vulnerabilities disclosed today. These vulnerabilities impact Microsoft Windows and Internet Explorer.

"In the first half of 2008, we saw a number of serious vulnerabilities that could create significant security issues for today's dynamic businesses," said Matt Watchinski, Director of the Sourcefire Vulnerability Research Team. "Detection and patching are essential to protecting against the latest identified vulnerabilities, but only a proactive approach to securing assets from unknown threats can truly safeguard an organization's most critical assets. Sourcefire's innovative solutions, backed by the VRT's leading-edge discovery and response, provide customers and open source users with the tools to protect their networks, even when the threat has not yet been identified."

Following Microsoft's disclosure earlier today, the Sourcefire VRT created, tested and delivered Snort rules designed to detect attacks targeting the Microsoft vulnerabilities listed below. These new rules are included in the latest Sourcefire Security Enhancement Update (SEU) released today.

- Microsoft Security Bulletin MS08-031 -- Critical vulnerabilities could allow remote code execution or information disclosure if a user viewed a specially crafted Web page using Internet Explorer.

- Microsoft Security Bulletin MS08-032 - A moderate vulnerability in the Microsoft Speech API could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled.

- Microsoft Security Bulletin MS08-033 -- Critical vulnerabilities in Microsoft DirectX could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system.

- Microsoft Security Bulletin MS08-034 -- An important vulnerability in the Windows Internet Name Service (WINS) could allow elevation of privilege. A local attacker who successfully exploited this vulnerability could take complete control of an affected system.

- Microsoft Security Bulletin MS08-035 -- An important vulnerability in implementations of Active Directory could be exploited to allow an attacker to cause a denial of service condition. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart.

- Microsoft Security Bulletin MS08-036 -- Important vulnerabilities in the Pragmatic General Multicast (PGM) protocol could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user's system to become non-responsive and require a restart to restore functionality.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo