SDS Banner

SmartDefense Services Bulletin
August 2007

Greetings! This bulletin features Check Point SmartDefense Services highlights for the month of . Please feel free to email us if you have any comments or questions.

To sign-up to the mailing list, send an email to listserv@amadeus.us.checkpoint.com with the text "SUBSCRIBE SMARTDEFENSE-NEWS" in the email body. If you'd like to unsubscribe from this bulletin, send an email to listserv@amadeus.us.checkpoint.com with the text "SIGNOFF SMARTDEFENSE-NEWS" in the email body.

 
In This Bulletin

About SmartDefense Services
Advisories
Defense Updates

About SmartDefense Services

Check Point SmartDefense Services maintain the most current preemptive security for your Check Point security infrastructure. To help your defenses stay continuously ahead of today’s constantly evolving threat landscape, SmartDefense Services provide:

  • Preemptive, ongoing, and real-time updates to defenses and security policies
  • Ongoing new protocol and application defenses against emerging threats and attacks
  • Step-by-step instructions on how to activate and configure defenses against emerging threats and vulnerabilities – usually before exploits are created by hackers
  • Anti-virus updates and alerts for Check Point VPN-1 UTM
  • Anti-spyware updates for Check Point Integrity Anti-Spyware 
  • Malicious applications database for automating network access and malware termination policies (Program Advisor Service for Integrity)
Advisories (Sorted by Severity, then Date)
CPAI-2007-079
  Date:
  Severity:
  Description: Update Protection against Samba NetDFS RPC Remote Code Execution Vulnerability
  Sources: FrSIRT/ADV-2007-1805
  Vulnerable Systems: Samba Team Samba 3.x, 3.0.25rc3 and prior
     
CPAI-2007-078
  Date:
  Severity:
  Description: Update Protection against MIT Kerberos Multiple Remote Code Execution Vulnerabilities
  Sources: Secunia Advisory: SA25800
  Vulnerable Systems: MIT Kerberos krb5-1.6.1 and prior
     
CPAI-2007-090
  Date:
  Severity:
  Description: Preemptive Protection against Ipswitch IMail Server IMAP SEARCH Command Buffer Overflow Vulnerability
  Sources: Secunia Advisory: SA26123
  Vulnerable Systems: Ipswitch IMail 2006 prior to 2006.21
Ipswitch IMail Plus 2006 prior to 2006.21
Ipswitch IMail Premium 2006 prior to 2006.21
     
CPAI-2007-089
  Date:
  Severity:
  Description: Preemptive Protection against Ipswitch IMail Server IMAP SUBSCRIBE Command Buffer Overflow Vulnerability
  Sources: Secunia Advisory: SA26123
  Vulnerable Systems: Ipswitch IMail 2006 prior to 2006.21
Ipswitch IMail Plus 2006 prior to 2006.21
Ipswitch IMail Premium 2006 prior to 2006.21
     
CPAI-2007-088
  Date:
  Severity:
  Description: Preemptive Protection against Ipswitch IMail Server LOGIN Command Buffer Overflow Vulnerability
  Sources: SecurityFocus: 24962
  Vulnerable Systems: Ipswitch IMail 2006 prior to 2006.21
Ipswitch IMail Plus 2006 prior to 2006.21
Ipswitch IMail Premium 2006 prior to 2006.21
     
CPAI-2007-080
  Date:
  Severity:
  Description: Integrity Clientless Security (ICS) Update 3.7.166.0
  Sources: SmartDefense Research Center
  Vulnerable Systems: Microsoft Windows clients
     
CPAI-2007-077
  Date:
  Severity:
  Description: Preemptive Protection against Digium Asterisk SIP Invalid Response Code Denial of Service Vulnerability
  Sources: Secunia Advisory: SA24579
  Vulnerable Systems: Digium Asterisk 1.2.x prior to 1.2.18
Digium Asterisk 1.4.x prior to 1.4.3
Digium Asterisk Appliance Developer Kit 0.x.x prior to 0.4.0
Digium Asterisk Business Edition A.x.x all releases
Digium Asterisk Business Edition B.x.x prior and including B.1.3.2
Digium AsteriskNOW Prior and including Beta 5
     
Defense Updates
CPAI-2007-080
  Date:
  Update Number: 692070717 (Connectra NGX R61/R62)
691070717 (Connectra NGX R60)
690070717 (Connectra 2.0)
  Description: Integrity Clientless Security (ICS) Update 3.7.166.0
     
CPAI-2007-079
  Date:
  Update Number: 541070716 (VPN-1 NG R54/R55)
550070716 (VPN-1 NG R55W)
591070716 (VPN-1 NGX R60)
602070716 (VPN-1 NGX R61/R62/R65)
591070716 (VPN-1 VSX NGX)
547070716 (InterSpect 1.x and 2.0)
592070716 (InterSpect NGX)
  Description: Samba NetDFS RPC Remote Code Execution Protection
     
CPAI-2007-078
  Date:
  Update Number: 541070716 (VPN-1 NG R54/R55)
550070716 (VPN-1 NG R55W)
591070716 (VPN-1 NGX R60)
602070716 (VPN-1 NGX R61/R62/R65)
591070716 (VPN-1 VSX NGX)
547070716 (InterSpect 1.x and 2.0)
592070716 (InterSpect NGX)
692070716 (Connectra NGX R61/R62)
  Description: MIT Kerberos Multiple Remote Code Execution Protections
     
SBP-2007-07
  Date:
  Update Number: 550070716 (VPN-1 NG R55W)
591070716 (VPN-1 NGX R60)
602070716 (VPN-1 NGX R61/R62/R65)
  Description: Security Best Practice: Blocking Skype
     
SDS Footer

You received this email because our records indicate that you wish to be contacted about SmartDefense Updates, Advisories, product news, and security information. If you do not want to receive further mailings, unsubscribe by sending a message with "SIGNOFF SMARTDEFENSE-NEWS" command to LISTSERV@AMADEUS.US.CHECKPOINT.COM in the first line (not the subject).

Copyright 2003-2008 Check Point Software Technologies LTD (Nasdaq: CHKP) All rights reserved.
800 Bridge Parkway, Redwood City, CA USA 94065