Check Point can protect from Microsoft IIS exploit
By siliconindia
|
Monday, 07 September 2009, 21:33 IST
Bangalore: Check Point Software Technologies (Nasdaq: CHKP), has announced that Check Point's IPS solutions can shield customers against exploits associated with the FTP Service in Microsoft Internet Information Services vulnerability (IIS). "Exploit code of this vulnerability is available in the wild, meaning hackers could take the code and use it to exploit IIS and remotely control a company's network," said Oded Gonda, Vice President of Network Security Products at Check Point. "Check Point's IPS products continue to provide protection against such vulnerabilities before they are even discovered, giving our customers the peace-of-mind that their systems are always secure."
Microsoft Internet Information Services is a collection of internet services packaged with several versions of the Windows operating system. IIS includes a FTP server service for exchanging and manipulating files over a TCP computer network. The vulnerability is due to an error in IIS that fails to do sufficient bounds checking when processing an FTP NLST command. The vulnerability could allow remote code execution on affected systems that are running the FTP service and are connected to the internet. Enterprise users at risk for this vulnerability have either IIS 5.0, IIS 5.1 or IIS 6.0.
Currently, Microsoft has not released any patch for this vulnerability. Check Point Security Gateway R70 customers using the IPS Software Blade are automatically protected from this threat and no action is required if they are using the 'Recommended Profile' setting. Check Point VPN-1 NGX R65, VSX NGX R65 and IPS-1 NGX R65 customers also have existing protection.
Check Point's IPS Software Blade, IPS-1 appliances and SmartDefense are supported by Check Point update services, which provide ongoing and real-time updates. Based on the Software Blade architecture, Check Point IPS Software Blade provides integrated firewall intrusion prevention capabilities at high speed. It also offers threat coverage for clients, servers, OS, malware/worm infections and other vulnerabilities. Software Blades are independent and flexible security modules that enable companies to select the functions they need to build a custom Check Point Security Gateway.