SDS Banner

SmartDefense Services Bulletin
August 2005

Greetings! This bulletin features Check Point SmartDefense Services highlights for the month of . Please feel free to email us if you have any comments or questions.

To sign-up to the mailing list, send an email to listserv@amadeus.us.checkpoint.com with the text "SUBSCRIBE SMARTDEFENSE-NEWS" in the email body. If you'd like to unsubscribe from this bulletin, send an email to listserv@amadeus.us.checkpoint.com with the text "SIGNOFF SMARTDEFENSE-NEWS" in the email body.

 
In This Bulletin

About SmartDefense Services
What's New
Advisories
Security Best Practices
Defense Updates

About SmartDefense Services

Check Point SmartDefense Services maintain the most current preemptive security for your Check Point security infrastructure. To help your defenses stay continuously ahead of today’s constantly evolving threat landscape, SmartDefense Services provide:

  • Preemptive, ongoing, and real-time updates to defenses and security policies
  • Ongoing new protocol and application defenses against emerging threats and attacks
  • Step-by-step instructions on how to activate and configure defenses against emerging threats and vulnerabilities – usually before exploits are created by hackers
  • Anti-virus updates and alerts for Check Point VPN-1 Express CI
  • Malicious applications database for automating network access and malware termination policies (Program Advisor Service for Integrity)
What's New

We've introduced a new easier-to-read format for the SmartDefense Services Bulletin. We welcome your comments on the new look, and any feedback on any aspect of this bulletin.

Advisories (Sorted by Severity, then Date)
CPAI-2005-105
  Date:
  Severity:
  Category: Remote Code Execution
  Description: Microsoft Internet Explorer COM Object (Javaprxy.dll) Vulnerability (MS05-037)
  Sources: Microsoft Security Advisory (903144)
Microsoft Security Bulletin MS05-037
  Vulnerable Systems:

Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6
Microsoft Internet Explorer 6 SP1
Microsoft Internet Explorer 6 SP2

     
CPAI-2005-109
  Date:
  Severity:
  Category: Remote Code Execution
  Description: Protection against Multiple Vulnerabilities in VERITAS Backup Exec Server
  Sources:  iDEFENSE Security Advisory 06.23.05 
iDEFENSE Security Advisory 06.23.05
  Vulnerable Systems: VERITAS Software BackUp Exec 9.0
VERITAS Software BackUp Exec 9.1
VERITAS Software BackUp Exec 10.0

     
CPAI-2005-108
  Date:
  Severity:
  Category: Remote Code Execution
  Description: Preemptive Protection against Multiple Vulnerabilities in Mozilla Firefox and NetScape
  Sources:

SecuriTeam
Security Tracker Alert ID: 1014470
SecurityTracker Alert ID: 1014469
Networksecurity.fi Security Advisory

  Vulnerable Systems: Mozilla Firefox version 1.0.4
Netscape version 8.0.2
     
CPAI-2005-104
  Date:
  Severity:
  Category: Remote Code Execution
  Description: NNTP Outlook Express News Reading Vulnerability (MS05-030)
  Sources:

Microsoft Security Bulletin MS05-030

  Vulnerable Systems: Microsoft Windows 2000 SP3 and SP4
Microsoft Windows XP SP1
Microsoft Windows XP 64-Bit Edition SP1
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003
     
CPAI-2005-110
  Date:
  Severity:
  Category: Directory Traversal
  Description: Preemptive Protection against SAP Internet Graphics Server Input Validation Vulnerability
  Sources:

SecurityTracker Alert ID: 1014568

  Vulnerable Systems: SAP Internet Graphics server prior to version 6.40 Patch 11
     
CPAI-2005-106
  Date:
  Severity:
  Category: Information disclosure
  Description: Preemptive Protection against Microsoft Windows Named Pipe NULL Session Bugs
  Sources:

Security Tracker Alert ID: 1014417

  Vulnerable Systems: Microsoft Windows 2000
Microsoft Windows NT 4.0
     
CPAI-2005-107
  Date:
  Severity:
  Category: Remote Code Execution
  Description: Preemptive Protection against Internet Download Manager Buffer Overflow Vulnerability
  Sources:

SecurityTracker Alert ID:1014404

  Vulnerable Systems: Internet Download Manager version 4.05
     
Security Best Practices (Sorted by Severity, then Date)
CPSA-2005-09
  Date:
  Severity:
  Category: HTTP Protocol Inspection
  Description: Security Best Practice: Protecting against HTTP Request Smuggling Attacks
  Sources: Watchfire
  Vulnerable Systems: Web servers
     
CPSA-2005-10
  Date:
  Severity:
  Category: Security Best Practices
  Description: Integrity Security Best Practice Advisory
  Sources: Internal research
  Vulnerable Systems: Microsoft Windows clients
     
Defense Updates
CPAI-2005-109
  Date:
  Update Number: 591050719 (VPN-1 NGX R60)
541050719 (VPN-1 NGAI R54/R55)
550050719 (VPN-1 NGAI R55W)
547050719 (InterSpect)
  Description: Spyware and Adware Protection
     
CPAI-2005-109
  Date:
  Update Number: 591050719 (VPN-1 NGX R60)
541050719 (VPN-1 NGAI R54/R55)
550050719 (VPN-1 NGAI R55W)
547050719 (InterSpect)
  Description: Veritas Backup Exec Server Protections
     
CPAI-2005-104
  Date:
  Update Number: 591050706 (VPN-1 NGX R60)
  Description: NNTP Protection (MS05-030)
     
SDS Footer

You received this email because our records indicate that you wish to be contacted about SmartDefense Updates, Advisories, product news, and security information. If you do not want to receive further mailings, unsubscribe by sending a message with "SIGNOFF SMARTDEFENSE-NEWS" command to LISTSERV@AMADEUS.US.CHECKPOINT.COM in the first line (not the subject).

Copyright 2003-2008 Check Point Software Technologies LTD (Nasdaq: CHKP) All rights reserved.
800 Bridge Parkway, Redwood City, CA USA 94065