Sourcefire(R) Protects Users from Exploits Against Microsoft Tuesday Vulnerabilities.
Sourcefire Vulnerability Research Team Delivers Same Day Protection for October's Microsoft Tuesday Vulnerabilities
COLUMBIA, Md. -- Open source innovator and SNORT([R])creator, Sourcefire, Inc. (Nasdaq: FIRE), a leader in network intrusion prevention, today announced that the Sourcefire Vulnerability Research Team (VRT VRT Vita Radio Transport (communications standard / protocol)
VRT Virus Removal Tools
VRT Vehicle Registration Tax
VRT Vehicle Reg Tax
VRT Voltage Reduction Technology (Intel Corp) ) has delivered rules to protect Sourcefire customers and Snort users from five Microsoft vulnerabilities announced today. These vulnerabilities impact Microsoft Windows, Internet Explorer, Office, Outlook Express and Windows Mail.
"Our immediate concern each Microsoft Tuesday is to ensure that Sourcefire customers and Snort users have the best possible protection as quickly as possible," said Matt Watchinski, Director of the Sourcefire Vulnerability Research Team. "Our rapid response in mitigating new Microsoft vulnerabilities, coupled with Sourcefire's Enterprise Threat Management (ETM (database) ETM - An active DBMS from the University of Karlsruhe. ) solutions, provides our users with the resources necessary to defend against zero-day threats."
Following Microsoft's disclosure earlier today, the Sourcefire VRT created, tested and delivered Snort rules designed to detect attacks targeting the Microsoft vulnerabilities listed below. These new rules are included in the latest Sourcefire Security Enhancement Update (SEU SEU Shoot 'Em Up (game category)
SEU St. Edward's University (Austin, Texas)
SEU Southeast University
SEU Single Event Upset ) released today.
* Microsoft Security Bulletin MS07-055 - Critical Microsoft Windows remote code execution vulnerability exists in the way that the Kodak Image Viewer, formerly known as Wang Image Viewer, handles specifically crafted images files. This vulnerability could allow an attacker to remotely execute code on the affected system.
* Microsoft Security Bulletin MS07-056 - Critical Microsoft Outlook Express and Windows Mail vulnerability could allow remote code execution due to an incorrectly handled malformed mal·formed
Abnormally or faultily formed. NNTP (Network News Transfer Protocol) The protocol used to connect to Usenet groups on the Internet. Usenet newsreaders support the NNTP protocol. See also NTP.
(messaging) NNTP - Network News Transfer Protocol. response. An attacker could exploit the vulnerability by constructing a specially crafted Web page.
* Microsoft Security Bulletin MS07-057 - Critical Microsoft Internet Explorer See Internet Explorer. vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page.
* Microsoft Security Bulletin MS07-058 - Important Microsoft Windows denial of service A condition in which a system can no longer respond to normal requests. See denial of service attack. vulnerability exists in the remote procedure call (RPC (Remote Procedure Call) A programming interface that allows one program to use the services of another program in a remote machine. The calling program sends a message and data to the remote program, which is executed, and results are passed back to the calling ) facility due to a failure in communicating with the NTLM NTLM NT LAN Manager (Microsoft Windows) security provider when performing authentication of RPC requests.
* Microsoft Security Bulletin MS07-059 - Important vulnerability in Microsoft Windows SharePoint Services 3.0 and Microsoft Office SharePoint Server 2007 could allow an attacker to run arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. The vulnerability could also allow an attacker to run arbitrary script to modify a user's cache, resulting in information disclosure at the workstation.
On Wednesday, October 10, 2007 at 1:00PM EDT EDT
Eastern Daylight Time
EDT Eastern Daylight Time
EDT n abbr (US) (= Eastern Daylight Time) → hora de verano de Nueva York
EDT , Matt Watchinski will take part in a SANS ISC (1) (Internet Systems Consortium, Redwood City, CA www.isc.org) An organization founded by Paul Vixie, Carl Malamud and Rick Adams in 1994 and later sponsored by UUNET and other Internet companies. Webcast hosted by Dr. Johannes Ulrich. During this Webcast, which occurs monthly on the Wednesday following each Microsoft Tuesday, Watchinski will review the latest capabilities of Snort 2.8 and discuss highlights of today's Microsoft Tuesday vulnerabilities. For more information on this Webcast, please visit: https://www.sans.org/webcasts/show.php?webcastid=90821
About the Sourcefire VRT
The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activities, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.
Sourcefire, Inc. (Nasdaq: FIRE), Snort creator and open source innovator, is a world leader in Enterprise Threat Management (ETM) solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks with its 3D Approach - Discover, Determine, Defend - to securing real networks. The Sourcefire 3D[TM] System is the first to unify IPS, NBA, NAC See network access control. and Vulnerability Assessment technologies under the same management console. This ETM approach equips customers with an efficient and effective layered security defense - protecting network assets before, during and after an attack. Through the years, Sourcefire has been consistently recognized for its innovation and industry leadership by customers, media and industry analysts alike - with more than 30 awards and accolades. Today, the names Sourcefire and founder Martin Roesch have grown synonymous with innovation and network security intelligence. For more information about Sourcefire, please visit http://www.sourcefire.com.
SOURCEFIRE[R], SNORT[R], the Sourcefire logo, the Snort and Pig logo, SECURITY FOR THE REAL WORLD[TM], SOURCEFIRE DEFENSE CENTER[TM], SOURCEFIRE 3D[TM], RNA RNA: see nucleic acid.
in full ribonucleic acid
One of the two main types of nucleic acid (the other being DNA), which functions in cellular protein synthesis in all living cells and replaces DNA as the carrier of genetic [TM], DAEMONLOGGER[TM], CLAMAV[TM], SOURCEFIRE SOLUTIONS NETWORK[TM], and certain other trademarks and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries.