Anzeige
Mehr »
Login
Mittwoch, 08.05.2024 Börsentäglich über 12.000 News von 688 internationalen Medien
Vor Neubewertung: Kupfer-Geheimtipp veröffentlich in dieser Sekunde sensationelle Bohrergebnisse
Anzeige

Indizes

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Aktien

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Xetra-Orderbuch

Fonds

Kurs

%

Devisen

Kurs

%

Rohstoffe

Kurs

%

Themen

Kurs

%

Erweiterte Suche
PR Newswire
13 Leser
Artikel bewerten:
(0)

Vulnerability Advisory: McAfee, Inc. Solutions Protect Against 19 Newly Disclosed Microsoft Windows Vulnerabilities


SANTA CLARA, Calif., May 8 /PRNewswire-FirstCall/ -- McAfee, Inc. , announced that it provides coverage for the 19 security vulnerabilities disclosed by Microsoft Corporation today. These vulnerabilities have been reviewed by McAfee(R) Avert(R) Labs, and based on their findings, McAfee recommends that users confirm the Microsoft product versioning outlined in the bulletins and update as recommended by Microsoft and McAfee. This includes deploying solutions to ensure protection against the vulnerabilities outlined in this advisory.

"Of particular concern is the large number of Microsoft Office, Word, Excel and Internet Explorer vulnerabilities being patched today," said Dave Marcus, security research and communications manager, McAfee Avert Labs. "These applications are the most frequently targeted applications by malware writers, so we recommend that all customers evaluate their security coverage and policies to insure they have adequate protection in place."

Microsoft Vulnerabilities Overview: * MS07-023 - Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution * MS07-024 - Vulnerabilities in Microsoft Word Could Allow Remote Code Execution * MS07-025 - Vulnerability in Microsoft Office Could Allow Remote Code Execution * MS07-026 - Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution * MS07-027 - Cumulative Security Update for Internet Explorer * MS07-028 - Vulnerability in CAPICOM Could Allow Remote Code Execution * MS07-029 - Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution Scope of Potential Compromise

Today's seven security bulletins cover a total of 19 vulnerabilities. Among the vulnerabilities, fifteen are rated critical by Microsoft due to their potential for remote code execution while the remaining four vulnerabilities have been rated important. McAfee Avert Labs worked with Microsoft to responsibly disclose and patch the MS07-024 (CVE 2007 - 0870) vulnerability in Word.

For additional information on today's vulnerabilities as well as information on current threats, visit McAfee's Threat Center at http://www.mcafee.com/us/threat_center/default.asp where you will find blogs http://www.avertlabs.com/research/blog/ from McAfee Avert Labs researchers. More information on the vulnerabilities can also be found at http://www.microsoft.com/technet/security/current.aspx.

McAfee Solutions


With McAfee's Security Risk Management approach, customers can effectively address business priorities and security realities. McAfee's award-winning solutions identify and block known and unknown attacks before they can cause damage. McAfee will continue to update its coverage as needed as new exploit vectors are discovered and as new threats emerge.

Out of the box, Host IPS protects against many buffer overflow exploits. McAfee Host IPS v6.0 and McAfee Entercept(R) protect users against code execution that may result from common classes of exploits targeted at the buffer overflow/overrun vulnerabilities in Microsoft Excel, Word, Office, Explorer, CAPICOM, and DNS RPC. This "out of the box" protection is provided without the need for security content updates for either product.

The McAfee Vulnerability Shield package for McAfee Host IPS v6.0 customers provides specific protection against common classes of exploits targeted at the vulnerabilities in Microsoft Exchange, Internet Explorer, and CAPICOM. Coverage was provided in a previous Vulnerability Shield package for the vulnerability in Windows DNS RPC. The Vulnerability Shield package is deployed through McAfee ePolicy Orchestrator(R) to agents, protecting systems without a reboot.

McAfee VirusScan(R) Enterprise 8.0i and McAfee Managed VirusScan with AntiSpyware protects users against code execution that may result from common classes of exploits targeted at the buffer overflow/overrun vulnerabilities in Microsoft Excel, Word, Office, Internet Explorer, and CAPICOM.

McAfee IntruShield(R) provides coverage for Microsoft Excel, Word, Office, Exchange, Internet Explorer, and CAPICOM vulnerabilities through signature sets released today. Coverage was provided in previous signature sets for the vulnerability in Windows DNS RPC. McAfee IntruShield sensors deployed in in- line mode can be configured with a response action to drop such packets for preventing these attacks.

The McAfee System Compliance Profiler, a component of McAfee ePolicy Orchestrator, is being updated for today's newly disclosed vulnerabilities in Microsoft Excel, Word, Office, Exchange, Internet Explorer, CAPICOM, and Windows DNS RPC to quickly assess compliance levels of the security patches announced today.

The McAfee Foundstone(R) and McAfee Policy Enforcer checks are being created to detect the vulnerabilities announced today, and will be available in the packages released today and the day after tomorrow, respectively. These checks are expected to accurately identify if a system is vulnerable in many enterprise environments.

McAfee Policy Auditor compliance checks and McAfee Remediation Manager remediations are being created to identify unpatched systems and apply the necessary patches to affected systems for the vulnerabilities in Microsoft Excel, Word, Office, Exchange, Internet Explorer, CAPICOM, and Windows DNS RPC. Updates will be available in the next V-Flash package.

Avert DAT files have already been released to detect known exploits and new detection will be added as new exploits are discovered. DAT files are used by McAfee GroupShield(R), PortalShield(TM), Secure Internet Gateway appliances, Secure Messaging Gateway appliances, Secure Web Gateway appliances, Total Protection suites, VirusScan Enterprise, VirusScan Command Line, VirusScan Online and other McAfee scanners. McAfee users can refer to http://www.mcafee.com/us/threat_center/default.asp for information regarding any new threats attempting to exploit these vulnerabilities.

McAfee Avert Labs maintains one of the top-ranked security threat and research organizations in the world, employing researchers in 16 countries around the globe. The Labs combine world-class malicious code and anti-virus research with intrusion prevention and vulnerability research expertise. McAfee protects customers by providing deep analysis and core technologies that are developed through the combined efforts of its researchers. McAfee Avert Labs continually monitors the Internet for new threats and attack vectors on a daily basis. Whenever possible, we will update our security technologies and coverage as these new threats and vectors emerge.

About McAfee, Inc.

McAfee Inc., the leading dedicated security technology company, headquartered in Santa Clara, California, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions, and continuously track and improve their security. http://www.mcafee.com/.

NOTE: McAfee, Avert, IntruShield, Entercept, Foundstone, ePolicy Orchestrator, VirusScan, GroupShield, and PortalShield are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the United States and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. (C) 2006 - 2007 McAfee, Inc. All Rights Reserved.
Lithium vs. Palladium - Ist das die Chance des Jahrzehnts?
Sichern Sie sich den kostenlosen PDF-Report! So können Sie vom Boom der Rohstoffe profitieren.
Hier klicken
© 2007 PR Newswire
Werbehinweise: Die Billigung des Basisprospekts durch die BaFin ist nicht als ihre Befürwortung der angebotenen Wertpapiere zu verstehen. Wir empfehlen Interessenten und potenziellen Anlegern den Basisprospekt und die Endgültigen Bedingungen zu lesen, bevor sie eine Anlageentscheidung treffen, um sich möglichst umfassend zu informieren, insbesondere über die potenziellen Risiken und Chancen des Wertpapiers. Sie sind im Begriff, ein Produkt zu erwerben, das nicht einfach ist und schwer zu verstehen sein kann.