contents

software
 
Microsoft Vulnerabilities: TippingPoint's Zero Day Initiative Reaction

TippingPoint says that three of the Microsoft Windows vulnerabilities published and patched in Microsoft bulletins have been discovered through TippingPoint's Zero Day Initiative. TippingPoint Intrusion Prevention System customers were preemptively protected against these vulnerabilities and other bulletins announced by Microsoft through the TippingPoint Digital Vaccine update service. The three vulnerabilities discovered by TippingPoint's ZDI were in Microsoft Excel (MS06-059: CVE-2006-2387), Microsoft Office (MS06-062: CVE-2006-3650), and Microsoft PowerPoint (MS06-058: CVE-2006-3435). All of the vulnerabilities could allow an attacker to take complete control over a victim's computer if that user logged in with administrative rights. Upon validating the vulnerabilities, TippingPoint had reported the discoveries to Microsoft, which in turn quickly applied the necessary resources to address the vulnerabilities and issued the patches.

In addition to protecting TippingPoint's customers from these three vulnerabilities, customers were also preemptively protected from another zero day vulnerability in the fresh bulletin, known as the Windows Shell vulnerability (MS06-057). This vulnerability had already had been exploited in the wild to install malicious programs on users' systems. TippingPoint's customers have been protected from zero day exploitation of this vulnerability since July 26. Since Microsoft had not issued a patch, the TippingPoint IPS was one of the few methods of protection against this zero day attack.



write your comments about the article :: 2006 Computing News :: home page