Wednesday, November 14, 2007

Vulnerability Advisory: McAfee, Inc. Solutions Protect Against Two Newly Disclosed Microsoft Vulnerabilities

McAfee, Inc. (NYSE:MFE) , today announced that it provides coverage for two security vulnerabilities disclosed by Microsoft Corporation today. These vulnerabilities have been reviewed by McAfee(R) Avert(R) Labs, and based on their findings, McAfee recommends that users confirm the Microsoft product version outlined in the bulletins and update as recommended by Microsoft and McAfee. This includes deploying solutions to ensure protection against the vulnerabilities outlined in this advisory.

"Today's Microsoft patches again emphasize the need for proactive browser protection and the risk of surfing the Web unprotected," said Dave Marcus, security research and communications manager at McAfee Avert Labs. "The critical Windows URI handling vulnerability is already being exploited. A Windows XP or Windows Server 2003 user with Internet Explorer 7 installed can become a victim by simply clicking a malicious Web link, a favorite attack method among cybercrooks."

McAfee also announced the debut of the McAfee Avert Labs Patch Tuesday webinar. "Our customers regularly ask us to walk them through the protection their McAfee products provide against risks associated with Patch Tuesday," said Jeff Green, senior vice president of McAfee Avert Labs and product development. "The webinar is like a one-on-one meeting with an Avert Labs researcher." (The Patch Tuesday webinar will be available later on Tuesday on McAfee's online Threat Center: http://www.mcafee.com/us/threat_center/)

Microsoft Vulnerabilities Overview:
-- MS07-061 - Vulnerability in Windows URI Handling Could Allow Remote
Code Execution
-- MS07-062 - Vulnerability in DNS Could Allow Spoofing


Scope of Potential Compromise

Today's two security bulletins cover a total of two vulnerabilities. One of the bulletins is rated critical by Microsoft due to its potential for remote code execution. The other is deemed important.

For additional information on today's vulnerabilities as well as information on current threats, visit McAfee's Threat Center at http://www.mcafee.com/us/threat_center/. McAfee recommends you sign up to receive the McAfee Avert Labs Security Advisory, describing detailed McAfee product coverage on the set of vulnerabilities described in this document, as well as McAfee product coverage for other threats. To sign-up visit: http://www.mcafee.com/us/threat_center/securityadvisory/signup.aspx. More information on the vulnerabilities can also be found at http://www.microsoft.com/technet/security/current.aspx

McAfee Solutions

With McAfee's Security Risk Management approach, customers can effectively address business priorities and security realities. McAfee's award-winning solutions identify and block known and unknown attacks before they can cause damage. McAfee will continue to update its coverage as needed as new exploit vectors are discovered and as new threats emerge.

The McAfee Vulnerability Shield package for McAfee Host IPS customers provides specific protection against common classes of exploits targeted at the vulnerability in Windows URI Handling. The Vulnerability Shield package is deployed through McAfee ePolicy Orchestrator(R) to agents, protecting systems without a reboot.

McAfee IntruShield(R) provides coverage for the DNS vulnerability through signature sets released today. Coverage for the Windows URI Handling vulnerability has been provided since Oct. 25. McAfee IntruShield sensors deployed in in-line mode can be configured with a response action to drop such packets for preventing these attacks.

The McAfee System Compliance Profiler, a component of McAfee ePolicy Orchestrator, is being updated for today's newly disclosed vulnerabilities in Windows URI Handling and DNS to quickly assess compliance levels of the security patches announced today.

The McAfee Foundstone(R) and McAfee Network Access Control checks are being created to detect the vulnerabilities announced today, and will be available in the packages released today and the day after tomorrow, respectively. These checks are expected to accurately identify if a system is vulnerable in many enterprise environments.

McAfee Policy Auditor compliance checks and McAfee Remediation Manager remediations are being created to identify unpatched systems and apply the necessary patches to affected systems for the vulnerabilities in Windows URI Handling and DNS. Updates will be available in the next V-Flash package released today.

Avert DAT files have already been released to detect known exploits and new detection will be added as new exploits are discovered. DAT files are used by McAfee GroupShield(R), PortalShield(TM), Secure Internet Gateway appliances, Secure Messaging Gateway appliances, Secure Web Gateway appliances, Total Protection suites, VirusScan(R) Enterprise, VirusScan Command Line, VirusScan Online and other McAfee scanners. McAfee users can refer to http://www.mcafee.com/us/threat_center/default.asp for information regarding any new threats attempting to exploit these vulnerabilities.

McAfee Avert Labs maintains one of the top-ranked security threat and research organizations in the world, employing researchers around the globe. The Labs combine world-class malicious code and anti-virus research with intrusion prevention and vulnerability research expertise. McAfee protects customers by providing deep analysis and core technologies that are developed through the combined efforts of its researchers. McAfee Avert Labs continually monitors the Internet for new threats and attack vectors on a daily basis. Whenever possible, we will update our security technologies and coverage as these new threats and vectors emerge.

About McAfee Inc.

McAfee Inc., the leading dedicated security technology company, headquartered in Santa Clara, California, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions, and continuously track and improve their security. http://www.mcafee.com/.



No comments:

Post a Comment

Related Posts with Thumbnails