Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 

New MS Vulnerabilities Information from Symantec

New MS Vulnerabilities Information from Symantec

Symantec currently provides system and network protection for three new vulnerabilities announced today by Microsoft: MS ASN.1 Integer Overflow, Cumulative Security Update for Internet Explorer and Windows Internet Naming Service (WINS) Buffer Overflow.

These vulnerabilities have been reviewed by Symantec Security Response, and Symantec recommends that users update the services affected, via the Microsoft windows update Website. Symantec also recommends that users implement best security practices such as restricting external access to all ports and services that are not explicitly intended to be accessible by remote parties. This action will limit exposure to these and other latent vulnerabilities. If appropriate, firewalls should also be deployed on individual systems to restrict access and network intrusion detection systems (NIDS) should be deployed to monitor network traffic for any suspicious or anomalous activity.

Microsoft Vulnerabilities Overview

· MS ASN.1 Integer Overflow (828028) -- Critical Rating The buffer overflow vulnerability in Microsoft ASN.1 could allow an attacker who successfully exploited this vulnerability to execute code with system privileges on an affected system. The attacker could then take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges.

· Cumulative Security Update for Internet Explorer (832894) -- Critical Rating For the Internet Explorer vulnerability, systems administrators should apply the security update immediately.

· Windows Internet Naming Service (WINS) Buffer Overflow (830352) -- Important Rating The vulnerability in Windows Internet Naming Service (WINS) could allow an attacker who sent a series of specially-crafted packets to a WINS server to cause the service to fail on Windows Server 2003. This could potentially cause a denial of service, and the service would have to be manually restarted to restore functionality. An attack on Windows 2000 and Windows NT 4.0 could cause a degradation in performance. WINS will then return to normal levels of functionality. A number of mitigating factors exist for this vulnerability. For example, the WINS service is not installed by default. In addition, when running on Windows Server 2003, WINS will automatically restart if attacked.

More information can be found at http://www.microsoft.com/security/security%5Fbulletins/.

Symantec Solutions Protecting Against New Microsoft Vulnerabilities Symantec Security Solutions

* Symantec DeepSight Threat Management System/Symantec DeepSight Alert Services - For Symantec DeepSight Threat Management System, the vulnerabilities have been summarized on the Daily Summary Reports sent to customers. Symantec is closely monitoring global activity for signs of attack and will deliver additional notifications as required. For Symantec DeepSight Alert Services, a notification has been distributed on the new vulnerabilities.

* Symantec Managed Security Services - MSS Managed Systems running Windows Operating Systems are not susceptible to the WINS vulnerability as those components & services are disabled as part of our standard baseline and system hardening process. MSS Managed Systems running Windows Operating Systems are vulnerable to the ASN.1 vulnerability. Due to the potential impact of this vulnerability, all affected systems are currently being updated via MSS emergency patch rollout procedures. MSS has contacted managed customers about this vulnerability and will continue to update customers on the status of this vulnerability via the MSS Secure Internet Interface.

* Symantec Gateway Security/Symantec Enterprise Firewall -- By default, Symantec's full application inspection firewall technology protects against the Microsoft ASN.1 and WINS vulnerabilities.

* Symantec Client Security/AntiVirus Solutions - Symantec has created heuristic detection for the Microsoft ASN.1 vulnerability.

* Symantec ManHunt - Symantec has released a signature to protect against the WINS vulnerability. ends


© Scoop Media

 
 
 
Business Headlines | Sci-Tech Headlines

 

Media Mega Merger: StuffMe Hearing Argues Over Moveable Feast

New Zealand's two largest news publishers are appealing against the Commerce Commission's rejection of the proposal to merge their operations. More>>

Elsewhere:


Approval: Northern Corridor Decision Released

The approval gives the green light to construction of the last link of Auckland’s Western Ring Route, providing an alternative route from South Auckland to the North Shore. More>>

ALSO:


Crown Accounts: $4.1 Billion Surplus

The New Zealand Government has achieved its third fiscal surplus in a row with the Crown accounts for the year ended 30 June 2017 showing an OBEGAL surplus of $4.1 billion, $2.2 billion stronger than last year, Finance Minister Steven Joyce says. More>>

ALSO:

Mycoplasma Bovis: One New Property Tests Positive

The newly identified property... was already under a Restricted Place notice under the Biosecurity Act. More>>

Accounting Scandal: Suspension Of Fuji Xerox From All-Of-Government Contract

General Manager of New Zealand Government Procurement John Ivil says, “FXNZ has been formally suspended from the Print Technology and Associated Services (PTAS) contract and terminated from the Office Supplies contract.” More>>