SDS Banner

SmartDefense Services Bulletin
April 2006

Greetings! This bulletin features Check Point SmartDefense Services highlights for the month of . Please feel free to email us if you have any comments or questions.

To sign-up to the mailing list, send an email to listserv@amadeus.us.checkpoint.com with the text "SUBSCRIBE SMARTDEFENSE-NEWS" in the email body. If you'd like to unsubscribe from this bulletin, send an email to listserv@amadeus.us.checkpoint.com with the text "SIGNOFF SMARTDEFENSE-NEWS" in the email body.

 
In This Bulletin

About SmartDefense Services
Advisories
Defense Updates

About SmartDefense Services

Check Point SmartDefense Services maintain the most current preemptive security for your Check Point security infrastructure. To help your defenses stay continuously ahead of today’s constantly evolving threat landscape, SmartDefense Services provide:

  • Preemptive, ongoing, and real-time updates to defenses and security policies
  • Ongoing new protocol and application defenses against emerging threats and attacks
  • Step-by-step instructions on how to activate and configure defenses against emerging threats and vulnerabilities – usually before exploits are created by hackers
  • Anti-virus updates and alerts for Check Point VPN-1 Express CI
  • Anti-spyware updates for Check Point Integrity Anti-Spyware 
  • Malicious applications database for automating network access and malware termination policies (Program Advisor Service for Integrity)
Advisories (Sorted by Severity, then Date)
CPAI-2006-024
  Date:
  Severity:
  Description: Update Protection against Multiple Microsoft Office Vulnerabilities (MS06-012)
  Sources:

Microsoft Security Bulletin MS06-012

  Vulnerable Systems: For a complete list of the affected systems, visit Microsoft Security Bulletin MS06-012 at http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx.
     
CPAI-2006-020
  Date:
  Severity:
  Description: Update Protection Against WMF/EMF Image Parsing Vulnerability (MS06-004)
  Sources: Microsoft Security Bulletin MS06-004
  Vulnerable Systems: Internet Explorer 5.01 SP4 on Microsoft Windows 2000 SP4
     
CPAI-2006-033
  Date:
  Severity:
  Description: Update Protection against Microsoft Internet Explorer createTextRange () Vulnerability (MS06-013)
  Sources: Microsoft Security Bulletin MS06-013
Microsoft Security Advisory (917077)
  Vulnerable Systems: Microsoft Internet Explorer 5.1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.x
     
CPAI-2006-032
  Date:
  Severity:
  Description: Update Protection against FreeBSD NFS Mount Request Denial Of Service Vulnerability
  Sources: FreeBSD Security Advisory FreeBSD-SA-06:10.nfs
  Vulnerable Systems: All FreeBSD releases.
     
CPAI-2006-030
  Date:
  Severity:
  Description: Update Protection against Oracle Reports Server Multiple Vulnerabilities
  Sources: Oracle Critical Patch Update - January 2006
  Vulnerable Systems:
     
CPAI-2006-029
  Date:
  Severity:
  Description: Update Protection against SHOUTcast Format String Vulnerability
  Sources: FrSirt
  Vulnerable Systems: SHOUTcast version 1.9.4 on Linux and possibly earlier versions
     
CPAI-2006-028
  Date:
  Severity:
  Description: Update Protection against Cisco IOS HTTP Server Code Injection Vulnerability
  Sources:  Cisco Security Advisory ID: 68322
  Vulnerable Systems: Cisco IOS HTTP Server version 11.0 through 12.4 (with the HTTP server enabled)
     
CPAI-2006-018
  Date:
  Severity:
  Description: Update Protection Against Microsoft Windows Web Client Service Vulnerability (MS06-008)
  Sources: Microsoft Security Bulletin MS06-008
  Vulnerable Systems: Microsoft Windows XP SP1 and SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
     
CPAI-2006-031
  Date:
  Severity:
  Description: Update Protection against Directory Traversal Vulnerability in IBM Tivoli Access Manager
  Sources: SecurityTracker ID: 1015582  
  Vulnerable Systems: Tivoli Access Manager versions 5.1.0.10, 6.0.0. Other versions may also be affected
     
CPAI-2006-027
  Date:
  Severity:
  Description: Update Protection against Tftpd32 Request Error Message Format String Vulnerability
  Sources:

FrSIRT/ADV-2006-0263

  Vulnerable Systems: Tftpd32 version 2.81 and earlier versions
     
CPAI-2006-026
  Date:
  Severity:
  Description: Update Protection against ezDatabase Remote File Inclusion Vulnerability
  Sources: SecurityFocus
  Vulnerable Systems: ezDatabase 2.0 and earlier versions
     
CPAI-2006-023
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.68.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-022
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.67.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-021
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.61.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-025
  Date:
  Severity:
  Description: Update Protection against Trojan/Spy. Goldun.de Vulnerability
  Sources: Check Point Virus Information Center
  Vulnerable Systems: Windows 95
Windows 98
Windows 98 SE
Windows NT
Windows ME
Windows 2000
Windows XP
Windows 2003
     
Defense Updates
CPAI-2006-033
  Date:
  Update Number: 541060327 (VPN-1 NG R54/R55)
550060327 (VPN-1 NG R55W)
591060327 (VPN-1 NGX R60)
602060327 (VPN-1 NGX R61)
547060327 (InterSpect 1.x and 2.0)
592060327 (InterSpect NGX)
  Description: Microsoft Internet Explorer createTextRange Protection
     
CPSA-2006-02
  Date:
  Update Number: 592060326 (InterSpect NGX)
  Description: Google Talk via Gmail Web Interface Protection
     
CPAI-2006-032
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: FreeBSD NFS Malformed Mount Request Protection
     
CPAI-2006-31
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: IBM Tivoli Access Manager Directory Traversal Protection
     
CPAI-2006-030
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: Oracle Report File Overwrite/Oracle Report Directory Traversal Protection
     
CPAI-2006-029
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: SHOUTcast Filename Request Format String Protection
     
CPAI-2006-028
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: Cisco IOS CDP Status Page Code Injection Protection
     
CPAI-2006-027
  Date:
  Update Number: 592060326 (InterSpect NGX)
  Description: TFTPD32 Request Error Message Format String Protection
     
CPAI-2006-026
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: ezDatabase Remote File Inclusion Protection
     
CPAI-2006-025
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: Trojan Spy Goldun.de Protection
     
CPAI-2006-016
  Date:
  Update Number: 541060326 (VPN-1 NG R54/R55)
550060326 (VPN-1 NG R55W)
591060326 (VPN-1 NGX R60)
602060326 (VPN-1 NGX R61)
547060326 (InterSpect 1.x and 2.0)
592060326 (InterSpect NGX)
  Description: Microsoft Windows Media Player Enhanced Protection (MS06-005)
     
CPAI-2006-023
  Date:
  Update Number: 690060308 (Connectra 2.0)
691060308 (Connectra NGX)
  Description: Integrity Clientless Security (ICS) Update 3.7.68.0
     
CPAI-2006-022
  Date:
  Update Number: 690060301 (Connectra 2.0)
691060301 (Connectra NGX)
  Description: Integrity Clientless Security (ICS) Update 3.7.67.0
     
CPAI-2006-021
  Date:
  Update Number: 690060220 (Connectra 2.0)
691060220 (Connectra NGX)
  Description: Integrity Clientless Security (ICS) Update 3.7.61.0
     
CPAI-2006-020
  Date:
  Update Number: 541060301 (VPN-1 NG R54/R55)
550060301 (VPN-1 NG R55W)
591060301 (VPN-1 NGX R60)
602060301 (VPN-1 NGX R61)
547060301 (InterSpect 1.x and 2.0)
592060301 (InterSpect NGX)
  Description: Update Protection Against WMF/EMF Image Parsing Vulnerability (MS06-004)
     
CPAI-2006-018
  Date:
  Update Number: 541060301 (VPN-1 NG R54/R55)
550060301 (VPN-1 NG R55W)
591060301 (VPN-1 NGX R60)
602060301 (VPN-1 NGX R61)
547060301 (InterSpect 1.x and 2.0)
592060301 (InterSpect NGX)
  Description: Microsoft Windows Web Client Service Protection (MS06-008)
     
SDS Footer

You received this email because our records indicate that you wish to be contacted about SmartDefense Updates, Advisories, product news, and security information. If you do not want to receive further mailings, unsubscribe by sending a message with "SIGNOFF SMARTDEFENSE-NEWS" command to LISTSERV@AMADEUS.US.CHECKPOINT.COM in the first line (not the subject).

Copyright 2003-2008 Check Point Software Technologies LTD (Nasdaq: CHKP) All rights reserved.
800 Bridge Parkway, Redwood City, CA USA 94065