October 10, 2007; 05:07 AM COLUMBIA, Md.--(BUSINESS WIRE)--Oct. 9, 2007--Open source innovator and SNORT(R) creator, Sourcefire, Inc. (Nasdaq: FIRE), a leader in network intrusion prevention, today announced that the Sourcefire Vulnerability Research Team (VRT) has delivered rules to protect Sourcefire customers and Snort users from five Microsoft vulnerabilities announced today. These vulnerabilities impact Microsoft Windows, Internet Explorer, Office, Outlook Express and Windows Mail.
"Our immediate concern each Microsoft Tuesday is to ensure that Sourcefire customers and Snort users have the best possible protection as quickly as possible," said Matt Watchinski, Director of the Sourcefire Vulnerability Research Team. "Our rapid response in mitigating new Microsoft vulnerabilities, coupled with Sourcefire's Enterprise Threat Management (ETM) solutions, provides our users with the resources necessary to defend against zero-day threats."
Following Microsoft's disclosure earlier today, the Sourcefire VRT created, tested and delivered Snort rules designed to detect attacks targeting the Microsoft vulnerabilities listed below. These new rules are included in the latest Sourcefire Security Enhancement Update (SEU) released today.
-- Microsoft Security Bulletin MS07-055 - Critical Microsoft Windows remote code execution vulnerability exists in the way that the Kodak Image Viewer, formerly known as Wang Image Viewer, handles specifically crafted images files. This vulnerability could allow an attacker to remotely execute code on the affected system.
-- Microsoft Security Bulletin MS07-056 - Critical Microsoft Outlook Express and Windows Mail vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page.
-- Microsoft Security Bulletin MS07-057 - Critical Microsoft Internet Explorer vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page.
-- Microsoft Security Bulletin MS07-058 - Important Microsoft Windows denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests.
-- Microsoft Security Bulletin MS07-059 - Important vulnerability in Microsoft Windows SharePoint Services 3.0 and Microsoft Office SharePoint Server 2007 could allow an attacker to run arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. The vulnerability could also allow an attacker to run arbitrary script to modify a user's cache, resulting in information disclosure at the workstation.
On Wednesday, October 10, 2007 at 1:00PM EDT, Matt Watchinski will take part in a SANS ISC Webcast hosted by Dr. Johannes Ulrich. During this Webcast, which occurs monthly on the Wednesday following each Microsoft Tuesday, Watchinski will review the latest capabilities of Snort 2.8 and discuss highlights of today's Microsoft Tuesday vulnerabilities. For more information on this Webcast, please visit: https://www.sans.org/webcasts/show.php?webcastid=90821
About the Sourcefire VRT
The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activities, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.
About Sourcefire
Sourcefire, Inc. (Nasdaq: FIRE), Snort creator and open source innovator, is a world leader in Enterprise Threat Management (ETM) solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks with its 3D Approach - Discover, Determine, Defend - to securing real networks. The Sourcefire 3D(TM) System is the first to unify IPS, NBA, NAC and Vulnerability Assessment technologies under the same management console. This ETM approach equips customers with an efficient and effective layered security defense - protecting network assets before, during and after an attack. Through the years, Sourcefire has been consistently recognized for its innovation and industry leadership by customers, media and industry analysts alike - with more than 30 awards and accolades. Today, the names Sourcefire and founder Martin Roesch have grown synonymous with innovation and network security intelligence. For more information about Sourcefire, please visit http://www.sourcefire.com.
SOURCEFIRE(R), SNORT(R), the Sourcefire logo, the Snort and Pig logo, SECURITY FOR THE REAL WORLD(TM), SOURCEFIRE DEFENSE CENTER(TM), SOURCEFIRE 3D(TM), RNA(TM), DAEMONLOGGER(TM), CLAMAV(TM), SOURCEFIRE SOLUTIONS NETWORK(TM), and certain other trademarks and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries.
Source: www.sourcefire.com
|
|