Protection From Critical MS Windows WMF Security Vulnerability

Determina Inc. announced that its Vulnerability Protection Suite (VPS), the only product suite that can universally protect against the WMF security vulnerability currently plaguing Microsoft Windows environments, is immediately available for evaluation. VPS provides users with out-of-the box protection against the WMF vulnerability with no need for updates, downtime, patch application, or signatures to combat the growing number of WMF exploits in the wild. VPS allows users to continue using Windows while enjoying full protection from WMF exploits and related attacks.

As reported in a December 28, 2005 Determina Research Advisory, a remote code execution vulnerability exists in the rendering of Windows Metafile (WMF) image format that could allow remote code execution on an affected system. Any program that renders WMF images on the affected systems could be vulnerable to this attack. An attacker who successfully exploited this vulnerability could take complete control of an affected system. Determina's VPS Memory Firewall, by default, protects users against code execution that may result from exploitation of the memory corruption based vulnerabilities reported in this advisory.

Determina VPS' unique ability to protect against 100 percent of critical Windows vulnerabilities has earned positive reviews in leading publications, including InfoWorld, PC Magazine, and Secure Enterprise. The company also received the InfoWorld 2005 Innovators Award for its pioneer work in mitigating critical Windows vulnerabilities. Vulnerability protection offers customers the ability to comprehensively address the security and operational issues around security and patching. The Determina VPS suite offers comprehensive vulnerability protection though its two products: Memory Firewall, which provides proactive, zero-day protection for the most dangerous class of vulnerabilities, and LiveShield, which provides precise vulnerability protection in real-time.

write your comments about the article :: 2006 Computing News :: home page