Adobe Flash Media Server Vulnerability
A directory traversal vulnerability has been discovered in Adobe Flash Media Server (FMS). This vulnerability allows a hacker to access normally inaccessible files and directories through a specially created HTTP request. This protection will detect and block attempts to transfer malformed HTTP requests sent to the vulnerable server. No update is required to address this vulnerability. Check Point pre-emptive protection is available through its integrated IPS products, IPS Software Blade, and SmartDefense. More information.
Microsoft IIS File Parsing Vulnerability
(Microsoft Security Response Center, SecurityTracker Alert ID: 1023387)
A filename parsing vulnerability has been reported in Microsoft Internet Information Services (IIS) web server. A remote attacker can exploit this vulnerability to execute arbitrary code on an affected system. Check Point provides immediate protection against exploits that use this vulnerability through its integrated IPS products. Check Point IPS Software Blade and SmartDefense detect and block HTTP requests attempting to exploit this vulnerability. More information.
HP OpenView Network Node Manager Vulnerabilities
(HP Security Bulletin)
Several vulnerabilities have been identified in HP OpenView Network Node Manager (OV NNM). The NNM server controls most of the networking devices on the company network. These vulnerabilities can be exploited remotely to execute arbitrary code or crash an affected system. Check Point provides pre-emptive protection against some of these vulnerabilities as well as immediate protections to other NNM attacks through its integrated IPS offerings, IPS Software Blade and SmartDefense. More information.
January 12, 2010
IN THIS ADVISORY:
- Adobe Flash Media Server Vulnerability
- Microsoft IIS File Parsing Vulnerability
- HP OpenView Network Node Manager Vulnerabilities
- Save a Database Version before an IPS Update
| DEPLOYMENT TIP
Best Practice: Save a Database Version before an IPS Update
SmartDashboard allows you to manage different versions of the database for troubleshooting and diagnostics. A database version consists of all security policies, objects, users, and IPS protections. With R70 Security Gateway you can control your database versions by activating the Database Revision Control
option directly from the IPS Download Updates window. This saves you the extra work of configuring it through the Database Revision Control window and automatically saves the database version you were working on before doing the update. Restoring a database version reverts the database back to the state that it was in before the update was performed.
To activate automatic revision control:
- In the IPS tab, select Download Updates.
- Check the Apply Revision Control: Before update save changes and create database version option.
Version Operations are performed via the Database Revision Control
window. This window can be accessed by selecting File > Database Revision Control
|» Highlighted Protections
This table lists Check Point protections for recently disclosed threats. In some cases, Check Point protections against such threats or threat types have been available for some time, and the date listed is the date when the protection became available.
More Updates >
|Have SmartDefense feature questions?
Participate in the SmartDefense User Forum. The SmartDefense Forum is your space for asking questions regarding all SmartDefense features, and to collaborate with other SmartDefense users, worldwide, on SmartDefense-related issues. Check Point employees may monitor the forum and provide information on the issues posted.
|Know someone who should be getting the Advisories?
» About the Check Point Update Services
Check Point provides ongoing and real-time updates and configuration information to its R65 products through SmartDefense Services, and to Check Point R70 products through an update service included with the relevant Software Blade subscriptions. These updates increase the value of your Check Point products and minimize threats by providing defenses that can be used before vendor patches are applied throughout your network. These defenses are developed and distributed by Check Point’s global Research and Response Centers. For more information, visit www.CheckPoint.com
|You have received this notification because either you have a User Center account or you have subscribed to the Check Point Security Advisory. If you would prefer to no longer receive security alerts and defense notifications please click the Unsubscribe link below.
©2003-2010 Check Point Software Technologies Ltd. (Nasdaq: CHKP) All rights reserved. 800 Bridge Parkway, Redwood City, CA USA 94065