Check Point Blade to block BIND vulnerability
By siliconindia
|
Friday, 07 August 2009, 00:39 IST |
3 Comments
Bangalore: Check Point has announced that Check Point (Intrusion Prevention System) IPS products will now protect customers against a newly discovered Berkeley Internet Name Domain (BIND) vulnerability. BIND affects both commonly used UNIX and Windows based Domain Name System (DNS) servers and allow a remote attacker to create a denial-of-service condition. "BIND is an important building block of the Internet DNS system. Exploits using vulnerabilities in BIND can lead to down-time, phishing and other attacks. Check Point IPS technologies are a critical security layer to traditional firewalls that will help an enterprise stay ahead of threats and vulnerabilities until servers or clients are patched," said Oded Gonda, Vice President of Network Security Products at Check Point.
BIND is a popular DNS implementation from Internet Systems Consortium (ISC). By sending a specially-crafted dynamic update packet to a BIND 9 server, a hacker can cause a denial of service by causing BIND to crash. The exploit is not limited to servers configured to allow dynamic updates. The vulnerability also affects servers that are masters of one or more zones and slave servers that are configured to forward updates to their masters. Check Point integrated and dedicated IPS solutions protect against these threats by detecting and blocking maliciously crafted DNS packets.
"Technology is growing by leaps and bounds and so are the threats. At Check Point we strive to resolve and patch vulnerabilities at a very nascent stage," said Bhaskar Bakthavatsalu, Regional Director, India and SAARC, Check Point. Check Point's IPS Software Blade, IPS-1 appliances and SmartDefense are supported by Check Point update service, which provides ongoing and real-time updates and configuration advisories for defenses and security policies.
Check Point IPS Software Blade provides firewall intrusion prevention capabilities with threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. Software Blades are independent and flexible security modules that enable companies to select the functions they need to build a custom Check Point Security Gateway.