IBM Helps Safeguard Customers from Critical Microsoft Vulnerabilities

IBM (NYSE: IBM) today announced its Internet Security Systems (ISS) X-Force® research and development team is helping to protect customers from several critical vulnerabilities announced by Microsoft. The vulnerabilities include a flaw discovered by IBM X-Force in Microsofts core antivirus engine, which is a default component of various Microsoft offerings such as Windows Live OneCare and Windows Defender, including Windows Defender for Vista.

This vulnerability allows an attacker to send a specially-crafted PDF file to users and trigger a heap overflow in the antivirus engine, resulting in remote code execution. Successful exploitation could grant an attacker system-level privileges. IBM ISS customers have been protected from this flaw since January.

IBM ISS urges companies to swiftly remediate this vulnerability, said Pete Allor, director of intelligence for IBM Internet Security Systems. IBM ISS continues to work closely with Microsoft to provide Vista support for our customers.

IBM ISS is also providing protection for three critical vulnerabilities in Internet Explorer covered by Microsoft bulletin MS07-016. The most important of these is an FTP client vulnerability that can be exploited by a malformed response from a malicious server. Since it is relatively simple for attackers to direct Web browsers to an FTP URL, X-Force advises companies to take this flaw seriously.

For the other two vulnerabilities, users of Internet Explorer 7 should be safe by default due to the ActiveX opt-in feature. X-Force believes this may provide encouragement for network administrators to migrate to the new browser, as ActiveX controls have been used frequently in exploits this year.

Through a combination of cutting-edge research, extensive industry collaboration and a preemptive technology platform designed to stop entire classes of threats without the need for continuous signature updates, IBM ISS keeps customers a step ahead of constantly evolving Internet threats.

IBMs X-Force advisory and alert on these issues can be found in the Internet Threat Information Center section on http://www.iss.net

Patches for these flaws are also available from Microsoft. Microsoft's security bulletin addressing this issue can be found at: http://www.microsoft.com/technet/security/current.aspx

For further details on Vista security, please see the IBM whitepaper, Microsoft Vista's Kernel-Locking, at: http://www.iss.net/documents/whitepapers/ISS_Vista_Kernel_Lock_ Whitepaper.pdf (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.)

About IBM Internet Security Systems

IBM Internet Security Systems is the trusted security advisor to thousands of the worlds leading businesses and governments, providing preemptive protection for networks, desktops and servers. An established leader in security since 1994, the IBM Proventia® integrated security platform is designed to automatically protect against both known and unknown threats, helping to keep networks up and running and shielding customers from online attacks before they impact business assets. IBM Internet Security Systems products and services are based on the proactive security intelligence of its X-Force® research and development team the unequivocal world authority in vulnerability and threat research. The Internet Security Systems product line is also complemented by comprehensive Managed Security Services and Professional Security Services. For more information, visit the Internet Security Systems Web site at www.iss.net or call 800-776-2362.

Internet Security Systems is a trademark and Proventia and X-Force are registered trademarks of International Business Machines Corporation in the United States, other countries, or both. All other companies and products mentioned are trademarks and property of their respective owners.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.