Vulnerability Advisory: McAfee, Inc. Solutions Protect Against Three Newly Disclosed Microsoft Windows Vulnerabilities


McAfee Intrusion Prevention and Security Risk Management Solutions Provide Protection to Identify and Block Potential New Attacks

SANTA CLARA, Calif., Sept. 12 /-- McAfee, Inc. (NYSE:MFE), announced that it provides coverage for the three security vulnerabilities disclosed by Microsoft Corporation today. These vulnerabilities have been reviewed by McAfee® Avert® Labs, and based on their findings McAfee recommends that users confirm the Microsoft product versioning outlined in the bulletins and update as recommended by Microsoft and McAfee. This includes deploying solutions to ensure protection against the vulnerabilities outlined in this advisory.

"This year, Microsoft has already patched more critical vulnerabilities than they have patched in 2004 and 2005 combined," said Monty Ijzerman, senior manager of the Global Threat Group for McAfee Avert Labs. "Of the three vulnerabilities announced today, the PGM vulnerability stands out due to the fact that it can be remotely exploited without user interaction. However only Windows XP systems that have the non-default Microsoft Message Queuing Service installed are vulnerable."

Microsoft Vulnerability Overview:

o MS06-052 - Vulnerability in Pragmatic General Multicast (PGM) Could Result in Remote Code Execution
o MS06-053 - Vulnerability in Indexing Service Could Allow Cross-Site Scripting
o MS06-054 - Vulnerability in Microsoft Publisher Could Allow Remote Code Execution

Scope of Potential Compromise
Today's three security bulletins cover vulnerabilities ranging from moderate to critical in ranking. The MS06-054 Vulnerability in Microsoft Office Publisher is rated critical as it allows for remote code execution after user interaction. The MS06-052 Vulnerability in Pragmatic General Multicast is remotely exploitable by an anonymous user but is rated important by Microsoft since the vulnerable service is not default installed.

For additional information on today's vulnerabilities as well as information on current threats, visit McAfee's Threat Center at
http://www.mcafee.com/us/threat_center/default.asp where you will find blogs

http://www.avertlabs.com/research/blog/ from McAfee Avert Labs researchers.

More information on the vulnerabilities can also be found at www.microsoft.com/technet/security/current.aspx .

McAfee Solutions
With McAfee's Security Risk Management approach, customers can effectively address business priorities and security realities. McAfee's award-winning solutions identify and block known and unknown attacks before they can cause damage. McAfee will continue to update its coverage as needed as new exploit vectors are discovered and as new threats emerge.

Out of the box, Host HIPS protects against many buffer overflow exploits. McAfee Host IPS v6.0 and McAfee Entercept® protect users against code execution that may result from common classes of exploits targeted at the buffer overflow/overrun vulnerabilities in Microsoft Publisher. This "out of the box" protection is provided without the need for security content updates for either product.

The McAfee Vulnerability Shield package for McAfee Host IPS v6.0 customers provides specific protection against common classes of exploits targeted at the vulnerability in Indexing Service. The Vulnerability Shield package is deployed through McAfee ePolicy Orchestrator® to agents, protecting systems without a reboot.

McAfee IntruShield® provides coverage for Microsoft Publisher, Indexing Service, and Pragmatic General Multicast vulnerabilities through signature sets released today. McAfee IntruShield sensors deployed in in-line mode can be configured with a response action to drop such packets for preventing these attacks.

The McAfee System Compliance Profiler, a component of McAfee ePolicy Orchestrator, is being updated for today's newly disclosed vulnerabilities to quickly assess compliance levels of the security patches announced today.

The McAfee Foundstone® and McAfee Policy Enforcer checks are being created to detect the vulnerabilities announced today, and will be available in the packages released today and tomorrow, respectively. These checks are expected to accurately identify if a system is vulnerable in many enterprise environments.

Avert DAT files with new detection will be added as new exploits are discovered. McAfee users can refer to www.mcafee.com/us/threat_center/default.asp for information regarding any new threats attempting to exploit these vulnerabilities.

McAfee Avert Labs maintains one of the top-ranked security threat and research organizations in the world, employing researchers in 16 countries around the globe. The Labs combine world-class malicious code and anti-virus research with intrusion prevention and vulnerability research expertise. McAfee protects customers by providing deep analysis and core technologies that are developed through the combined efforts of its researchers. McAfee Avert Labs continually monitors the Internet for new threats and attack vectors on a daily basis. Whenever possible, we will update our security technologies and coverage as these new threats and vectors emerge.

About McAfee, Inc.
McAfee Inc., headquartered in Santa Clara, California and the global leader in Intrusion Prevention and Security Risk Management, delivers proactive and proven solutions and services that secure systems and networks around the world. With its unmatched security expertise and commitment to innovation, McAfee empowers home users, businesses, the public sector, and service providers with the ability to block attacks, prevent disruptions, and continuously track and improve their security. http://www.mcafee.com/

Source: McAfee, Inc.

CONTACT:
Erica Coleman
McAfee, Inc.
+1-408-346-5624
Email: erica_coleman@mcafee.com

Andrew Miller
Red Consultancy
+1-415-618-8811
Email: andrew.miller@redconsultancy.com

Web site: http://www.mcafee.com/

All Topics