SDS Banner

SmartDefense Services Bulletin
March 2006

Greetings! This bulletin features Check Point SmartDefense Services highlights for the month of . Please feel free to email us if you have any comments or questions.

To sign-up to the mailing list, send an email to listserv@amadeus.us.checkpoint.com with the text "SUBSCRIBE SMARTDEFENSE-NEWS" in the email body. If you'd like to unsubscribe from this bulletin, send an email to listserv@amadeus.us.checkpoint.com with the text "SIGNOFF SMARTDEFENSE-NEWS" in the email body.

 
In This Bulletin

About SmartDefense Services
What's New
Advisories
Defense Updates

About SmartDefense Services

Check Point SmartDefense Services maintain the most current preemptive security for your Check Point security infrastructure. To help your defenses stay continuously ahead of today’s constantly evolving threat landscape, SmartDefense Services provide:

  • Preemptive, ongoing, and real-time updates to defenses and security policies
  • Ongoing new protocol and application defenses against emerging threats and attacks
  • Step-by-step instructions on how to activate and configure defenses against emerging threats and vulnerabilities – usually before exploits are created by hackers
  • Anti-virus updates and alerts for Check Point VPN-1 Express CI
  • Anti-spyware updates for Check Point Integrity Anti-Spyware 
  • Malicious applications database for automating network access and malware termination policies (Program Advisor Service for Integrity)
What's New

New enhanced and easier-to-read presentation format for SmartDefense Services Advisories and Updates is here. We've listened to your feedback and have made the Advisories and Updates web pages easier to read and scan. All SmartDefense Services Updates and Advisories from January 2006 and later will use the new format.

Advisories (Sorted by Severity, then Date)
CPAI-2006-016
  Date:
  Severity:
  Description: Enhanced Protection Against Microsoft Windows Media Player Vulnerability (MS06-005)
  Sources: Microsoft Security Bulletin MS06-005
eEye
  Vulnerable Systems: Microsoft Windows Media Player 7.1 through 10

Windows NT 4.0
Windows 98 / ME
Windows 2000 SP4
Windows XP SP1 / SP2
Windows 2003
     
CPAI-2006-019
  Date:
  Severity:
  Description: Built-In Protection against IGMPv3 Denial of Service Vulnerability (MS06-007)
  Sources: Microsoft Security Bulletin MS06-007
  Vulnerable Systems: Microsoft Windows XP SP1/SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
     
CPAI-2006-015
  Date:
  Severity:
  Description: Update Protection against Microsoft Windows Web Client Service Vulnerability (MS06-008)
  Sources: Microsoft Security Bulletin MS06-008
  Vulnerable Systems: Microsoft Windows XP SP1 and SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
     
CPAI-2006-012
  Date:
  Severity:
  Description: Update Protection against a Command Execution Vulnerability in HP OpenView Node Manager
  Sources: FrSIRT/ADV-2005-1539
  Vulnerable Systems: HP OpenView Network Node Manager version 6.2
HP OpenView Network Node Manager version 6.4
HP OpenView Network Node Manager version 7.01
HP OpenView Network Node Manager version 7.50
     
CPAI-2006-010
  Date:
  Severity:
  Description: Protection against Microsoft Windows Embedded Web Fonts Vulnerability (MS06-002)
  Sources: Microsoft Security Bulletin MS06-002
  Vulnerable Systems: Microsoft Windows 2000 SP4
Microsoft Windows XP SP1 and SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
     
CPAI-2006-017
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.60.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-014
  Date:
  Severity:
  Description: Update Protection against A Format String Vulnerability in mod_auth_pgsql for Apache
  Sources: iDEFENSE ADVISORY: 01.09.06
  Vulnerable Systems: version 2.0.2b1 of mod_auth_pgsql for Apache 2.x
     
CPAI-2006-013
  Date:
  Severity:
  Description: Update Protection against Oracle XDB HTTP Buffer Overflow Vulnerability
  Sources: Oracle Security Alert 58
  Vulnerable Systems: XML Database (XDB) functionality for Oracle 9i Database Release 2
     
CPAI-2006-011
  Date:
  Severity:
  Description: Update Protection against Multiple PHP-based Vulnerabilities
  Sources: FrSIRT/ADV-2006-0101
SANS organization
  Vulnerable Systems: ADOdb version 4.68 (for PHP) and prior
Defacing Tool 2.0 by r3v3ng4ns
     
CPAI-2006-008
  Date:
  Severity:
  Description: Update Protection Against Oracle 9i XDB FTP UNLOCK command Vulnerability
  Sources: Oracle Security Alert 58
  Vulnerable Systems: Oracle 9i FTP XDB service
     
CPAI-2006-008
  Date:
  Severity:
  Description: Update Protection against Oracle FTP XDB UNLOCK Command Execution Vulnerability
  Sources:

Oracle Security Alert 58

  Vulnerable Systems: Oracle9i Database Release 2
     
CPAI-2006-009
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.59.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients 
     
Defense Updates
CPAI-2006-17
  Date:
  Update Number: 690060209 (Connectra 2.0)
691060209 (Connectra NGX)
  Description: Integrity Clientless Security (ICS) Update 3.7.60.0
     
CPAI-2006-014
  Date:
  Update Number: 541060212 (VPN-1 NG R54/R55)
550060212 (VPN-1 NG R55W)
591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.0)
592060212 (InterSpect NGX)
  Description: Apache Format String Protection
     
CPAI-2006-013
  Date:
  Update Number: 541060212 (VPN-1 NG R54/R55)
550060212 (VPN-1 NG R55W)
591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.0)
592060212 (InterSpect NGX)
  Description: Oracle XDB HTTP Buffer Overflow Protection
     
CPAI-2006-012
  Date:
  Update Number: 541060212 (VPN-1 NG R54/R55)
550060212 (VPN-1 NG R55W)
591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.0)
592060212 (InterSpect NGX)
  Description: HP OpenView Command Execution Protection
     
CPAI-2006-011
  Date:
  Update Number: 541060212 (VPN-1 NG R54/R55)
550060212 (VPN-1 NG R55W)
591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.0)
592060212 (InterSpect NGX)
  Description: PHP-based Vulnerabilities Protection
     
CPAI-2006-010
  Date:
  Update Number: 541060212 (VPN-1 NG R54/R55)
550060212 (VPN-1 NG R55W)
591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.0)
592060212 (InterSpect NGX)
  Description: Microsoft Windows EOT Files Protection (MS06-002)
     
CPAI-2006-008
  Date:
  Update Number: 591060212 (VPN-1 NGX R60)
602060212 (VPN-1 NGX R61)
547060212 (InterSpect 1.x and 2.x)
592060212 (InterSpect NGX)
  Description: Oracle XDB FTP Protection
     
CPAI-2006-004
  Date:
  Update Number: 592060212 (InterSpect NGX)
  Description: Protection against PHP-Nuke and PHPGedView Remote Execution Commands
     
CPSA-2006-01
  Date:
  Update Number: 592060212 (InterSpect NGX)
  Description: Protection against CIFS Brute Force Attacks
     
CPAI-2006-009
  Date:
  Update Number: 690060202 (Connectra 2.0)
691060202 (Connectra NGX)
  Description: Integrity Clientless Security (ICS) Update 3.7.59.0
     
SDS Footer

You received this email because our records indicate that you wish to be contacted about SmartDefense Updates, Advisories, product news, and security information. If you do not want to receive further mailings, unsubscribe by sending a message with "SIGNOFF SMARTDEFENSE-NEWS" command to LISTSERV@AMADEUS.US.CHECKPOINT.COM in the first line (not the subject).

Copyright 2003-2008 Check Point Software Technologies LTD (Nasdaq: CHKP) All rights reserved.
800 Bridge Parkway, Redwood City, CA USA 94065