SDS Banner

SmartDefense Services Bulletin
July 2006

Greetings! This bulletin features Check Point SmartDefense Services highlights for the month of . Please feel free to email us if you have any comments or questions.

To sign-up to the mailing list, send an email to listserv@amadeus.us.checkpoint.com with the text "SUBSCRIBE SMARTDEFENSE-NEWS" in the email body. If you'd like to unsubscribe from this bulletin, send an email to listserv@amadeus.us.checkpoint.com with the text "SIGNOFF SMARTDEFENSE-NEWS" in the email body.

 
In This Bulletin

About SmartDefense Services
What's New
Advisories
Defense Updates

About SmartDefense Services

Check Point SmartDefense Services maintain the most current preemptive security for your Check Point security infrastructure. To help your defenses stay continuously ahead of today’s constantly evolving threat landscape, SmartDefense Services provide:

  • Preemptive, ongoing, and real-time updates to defenses and security policies
  • Ongoing new protocol and application defenses against emerging threats and attacks
  • Step-by-step instructions on how to activate and configure defenses against emerging threats and vulnerabilities – usually before exploits are created by hackers
  • Anti-virus updates and alerts for Check Point VPN-1 UTM
  • Anti-spyware updates for Check Point Integrity Anti-Spyware 
  • Malicious applications database for automating network access and malware termination policies (Program Advisor Service for Integrity)
What's New

New! Single SmartDefense Services Console. The NGX R61 platform introduced a new single SmartDefense Services management console. The new GUI console resides in SmartCenter, and provides a single view of update status for multiple enforcement points using SmartDefense Services. With a single management console, SmartDefense updates can be easily and consistently applied to all your enforcement points.

New! Variable Pricing. You told us that we should introduce variable SmartDefense Services pricing based on size of gateway being protected. We listened. To learn more, please contact your Check Point provider or refer to the price list on our website.

Advisories (Sorted by Severity, then Date)
CPAI-2006-063
  Date:
  Severity:
  Description: Preemptive Protection against Graphics Rendering Engine Vulnerability (MS06-026)
  Sources: Microsoft Security Bulletin MS06-026
  Vulnerable Systems: Microsoft Windows 98
Microsoft Windows 98 Second Edition (SE)
Microsoft Windows Millennium Edition (Me)
     
CPAI-2006-068
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.89.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-067
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.88.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-066
  Date:
  Severity:
  Description: Preemptive Protection against MySQL sql_parse Information Disclosure Vulnerabilities
  Sources: FrSIRT/ADV-2006-1633
  Vulnerable Systems: MySQL version 4.0.26 and prior
MySQL version 4.1.18 and prior
MySQL version 5.0.20 and prior
MySQL version 5.1.9 and prior
     
CPAI-2006-065
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.87.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-064
  Date:
  Severity:
  Description: Preemptive Protection against Microsoft IP Source Route Vulnerability (MS06-032)
  Sources: Microsoft Security Bulletin MS06-032
  Vulnerable Systems: Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP SP1 and SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
     
CPAI-2006-062
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.86.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2006-061
  Date:
  Severity:
  Description: Update Protection against Microsoft ISA Server Manipulation Vulnerability
  Sources: SecuriTeam
  Vulnerable Systems: Microsoft ISA Server 2004
     
CPAI-2006-060
  Date:
  Severity:
  Description: Update Protection against Apache Header Injection Vulnerability
  Sources: SecurityFocus
  Vulnerable Systems: Apache 1.3.34/2.0.57/2.2.1
     
CPAI-2006-059
  Date:
  Severity:
  Description: Update Protection against Multiple SAP Business Connector Vulnerabilities
  Sources: CYBSEC
  Vulnerable Systems: SAP SAP Business Connector 4.6
SAP SAP Business Connector 4.7
SAP Business Connector (BC) Core Fix 7 and prior
     
CPAI-2006-058
  Date:
  Severity:
  Description: Update Protection against Ipswitch WhatsUp Professional 2006 Multiple Vulnerabilities
  Sources: Full-disclosure
SecuriTeam
  Vulnerable Systems: WhatsUp Professional 2006
     
CPAI-2006-057
  Date:
  Severity:
  Description: update Protection against osCommerce SQL Injection Vulnerability
  Sources: Secunia Advisory: SA10443
  Vulnerable Systems: osCommerce 2.x
     
CPAI-2006-056
  Date:
  Severity:
  Description: Update Protection against Adobe Reader Extensions Vulnerabilities
  Sources: Secunia Research
  Vulnerable Systems: Adobe Document Server for Reader Extensions 6.0
     
Defense Updates
CPAI-2006-068
  Date:
  Update Number: 692060626 (Connectra NGX R61)
691060626 (Connectra NGX)
690060626 (Connectra 2.0)
  Description: Integrity Clientless Security (ICS) Update 3.7.89.0
     
CPAI-2006-067
  Date:
  Update Number: 692060619 (Connectra NGX R61)
691060619 (Connectra NGX)
690060619 (Connectra 2.0)
  Description: Integrity Clientless Security (ICS) Update 3.7.88.0
     
CPAI-2006-065
  Date:
  Update Number: 692060612 (Connectra NGX R61)
691060612 (Connectra NGX)
690060612 (Connectra 2.0)
  Description: Integrity Clientless Security (ICS) Update 3.7.87.0
     
CPAI-2006-062
  Date:
  Update Number: 692060607 (Connectra NGX R61)
691060607 (Connectra NGX)
690060607 (Connectra 2.0)
  Description: Integrity Clientless Security (ICS) Update 3.7.86.0
     
CPAI-2006-061
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: MS ISA Server 2004 Manipulation Protection
     
CPAI-2006-060
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: Apache Header Injection Protection
     
CPAI-2006-059
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: SAP Business Connector Protection
     
CPAI-2006-058
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: Ipswitch WhatsUp Professional Multiple Vulnerabilities Protection
     
CPAI-2006-057
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: osCommerce SQL Injection Protection
     
CPAI-2006-056
  Date:
  Update Number: 541060606 (VPN-1 NG R54/R55)
550060606 (VPN-1 NG R55W)
591060606 (VPN-1 NGX R60)
602060606 (VPN-1 NGX R61)
591060606 (VPN-1 VSX NGX)
547060606 (InterSpect 1.x and 2.0)
592060606 (InterSpect NGX)
  Description: Adobe Reader Extensions Protection
     
SDS Footer

You received this email because our records indicate that you wish to be contacted about SmartDefense Updates, Advisories, product news, and security information. If you do not want to receive further mailings, unsubscribe by sending a message with "SIGNOFF SMARTDEFENSE-NEWS" command to LISTSERV@AMADEUS.US.CHECKPOINT.COM in the first line (not the subject).

Copyright 2003-2008 Check Point Software Technologies LTD (Nasdaq: CHKP) All rights reserved.
800 Bridge Parkway, Redwood City, CA USA 94065