Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 


Microsoft Vulnerabilities Announced 13/4

Symantec Voice of Reason for Microsoft Vulnerabilities Announced 13/4

On Tuesday, April 13, Microsoft issued information on several new product vulnerabilities - many of these vulnerabilities are quite severe. As a result, Symantec has raised the DeepSight ThreatCon from a level 1 to a level 2. Symantec's ThreatCon Rating provides an overall view of global Internet Security and is based on a 1-4 rating system with a level 4 being the highest threat level.

Below is information on the Microsoft vulnerabilities that Symantec views as most critical to consumers and enterprises as well as Symantec solutions that protect against them. If you would like to speak with Symantec regarding any of the vulnerabilities disclosed today by Microsoft, please contact Rachael Joel (details below).

A complete view of all the vulnerabilities released today by Microsoft can be found at http://www.microsoft.com/security/security_bulletins/200404_windows.asp.

1. Security Update for Microsoft Windows (835732) Microsoft disclosed several new vulnerabilities for Microsoft Windows and has issued a security bulletin based on these vulnerabilities. ( http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx) All of these vulnerabilities are viewed as critical by Symantec. However, Symantec has identified the LSASS Vulnerability (below) as one of the most severe and encourages users to install the patch provided by Microsoft immediately.

Local Security Authority Subsystem Service (LSASS) Vulnerability - Symantec has rated this threat as critical. A buffer overflow vulnerability exists in the LSASS service that could allow remote code execution on an affected system. LSASS provides an interface for managing local security, domain authentication, and Active Directory processes. If the system was compromised, an attacker could gain complete control of the machine and perform actions on the affected machine similar to a user or administrator, such as erase files, steal information, etc.

Symantec Protection/Recommendations: In addition to best practices, Symantec encourages users to install the patch provided by Microsoft. By default, Symantec's full application inspection firewall technology protects against the LSASS vulnerability by blocking all unused incoming ports. No additional configuration or patch is required. Firewall administrators are advised to verify that their security policy does not include opening the following ports UDP: 135, 137, 138, 44 and TCP 135, 139, 445, 593.

Symantec customers who are using products that include Symantec's personal firewall technology, such as Norton Personal Firewall, Norton Internet Security and Symantec Client Security are automatically protected from this vulnerability. Users should also block the various ports above that are at risk.

2. Cumulative Security Update for Outlook Express (837009) Microsoft has issued a cumulative update that includes all previously-released updates for Outlook Express 5.5 and Outlook Express 6.0. ( http://www.microsoft.com/technet/security/bulletin/MS04-013.mspx) This update includes security fixes for vulnerabilities that are currently being exploited in the wild. Symantec cautions users that these vulnerability can be exploited through the Outlook Preview pane, and could allow a worm/blended threat to automatically infect systems, which could result in an attacker gaining complete control of the users machine. These vulnerability can also be exploited by visiting a malicious Web site. In this scenario, the attacker would have to host a Web site that contains a Web page that can be used to exploit these vulnerability. An attacker would then have to lure the user to that site, typically by getting them to clink on a specific link. This may decrease the risk associated with these vulnerability.

Symantec Protection/Recommendations: Symantec has rated this threat as critical. These versions of Outlook Express are widely used and Symantec strongly encourages users to install the patch provided by Microsoft to patch their systems as soon as possible. Symantec's AntiVirus solutions automatically protect against threats related to this vulnerability through its Bloodhound heuristics.

3. Cumulative Update for Microsoft RPC/DCOM (828741) Microsoft has issued an update for several new vulnerabilities in RPC/DCOM. ( http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx)

Platforms that may be affected by this vulnerability include Windows 98, NT, XP, Win 2003, Win XP 64. If a system was compromised, an attacker could take any action including installing programs; viewing or changing information, deleting data etc.

Symantec Protection/Recommendations: In addition to best practices, Symantec encourages users to install the patch provided by Microsoft. By default, Symantec's full application inspection firewall technology protects against this vulnerability by blocking all unused incoming ports. Firewall administrators are advised to verify that their security policy does not include the following incoming ports. UDP: 135, 137, 138, 445 and TCP: 135, 139, 445, 593. Additionally, by default RPC over HTTP (TCP port 80 or 443) is blocked by the FW. No additional configuration or patch is required.

Symantec customers who are using products that include Symantec's personal firewall technology, such as Norton Personal Firewall, Norton Internet Security and Symantec Client Security are automatically protected from this vulnerability. Users should also block the various ports above that are at risk.

© Scoop Media

 
 
 
 
 
Business Headlines | Sci-Tech Headlines

 

Sky City : Auckland Convention Centre Cost Jumps By A Fifth

SkyCity Entertainment Group, the casino and hotel operator, is in talks with the government on how to fund the increased cost of as much as $130 million to build an international convention centre in downtown Auckland, with further gambling concessions ruled out. The Auckland-based company has increased its estimate to build the centre to between $470 million and $530 million as the construction boom across the country drives up building costs and design changes add to the bill.
More>>

ALSO:

RMTU: Mediation Between Lyttelton Port And Union Fails

The Rail and Maritime Union (RMTU) has opted to continue its overtime ban indefinitely after mediation with the Lyttelton Port of Christchurch (LPC) failed to progress collective bargaining. More>>

Earlier:

Science Policy: Callaghan, NSC Funding Knocked In Submissions

Callaghan Innovation, which was last year allocated a budget of $566 million over four years to dish out research and development grants, and the National Science Challenges attracted criticism in submissions on the government’s draft national statement of science investment, with science funding largely seen as too fragmented. More>>

ALSO:

Scoop Business: Spark, Voda And Telstra To Lay New Trans-Tasman Cable

Spark New Zealand and Vodafone, New Zealand’s two dominant telecommunications providers, in partnership with Australian provider Telstra, will spend US$70 million building a trans-Tasman submarine cable to bolster broadband traffic between the neighbouring countries and the rest of the world. More>>

ALSO:

More:

Statistics: Current Account Deficit Widens

New Zealand's annual current account deficit was $6.1 billion (2.6 percent of GDP) for the year ended September 2014. This compares with a deficit of $5.8 billion (2.5 percent of GDP) for the year ended June 2014. More>>

ALSO:

Still In The Red: NZ Govt Shunts Out Surplus To 2016

The New Zealand government has pushed out its targeted return to surplus for a year as falling dairy prices and a low inflation environment has kept a lid on its rising tax take, but is still dangling a possible tax cut in 2017, the next election year and promising to try and achieve the surplus pledge on which it campaigned for election in September. More>>

ALSO:

Job Insecurity: Time For Jobs That Count In The Meat Industry

“Meat Workers face it all”, says Graham Cooke, Meat Workers Union National Secretary. “Seasonal work, dangerous jobs, casual and zero hours contracts, and increasing pressure on workers to join non-union individual agreements. More>>

ALSO:

Get More From Scoop

 
 
Standards New Zealand

Standards New Zealand
 
 
 
 
 
 
 
 
Sci-Tech
Search Scoop  
 
 
Powered by Vodafone
NZ independent news