»Top Protections
Microsoft Patches Three Zero-Day Vulnerabilities
Microsoft reported three zero-day vulnerabilities in the closing days of 2010 and the first week of 2011 that have been patched in their monthly patch roundup released on February 8, 2011. Check Point customers have enjoyed network protection against these vulnerabilities since shortly after their announcement, and in one case pre-emptive protection has been in place since early 2006. Learn More .
Zero-Day Information Disclosure Vulnerability in Microsoft MHTML Protocol Handler
An information disclosure vulnerability has been reported in the Microsoft Windows MHTML protocol handler. This vulnerability could allow an attacker to cause malicious scripts to be run on the targeted machine when visiting various Web sites, resulting in information disclosure. No patch has been announced by Microsoft as of February 8, 2011. Until a patch is released, Check Point IPS Software Blade and SmartDefense provide network protection against these vulnerabilities in the latest IPS update by detecting and blocking attempts to exploit them. Learn More .
Security Best Practice: Blocking iPhone Web Browsing on the Enterprise Wireless Network
Some organizations prefer to prevent the use of their wireless networks by smartphones for browsing the Internet, since those connections can potentially take up a lot of bandwidth and also because this kind of use may circumvent the organizational security policy. The Check Point IPS Software Blade can block HTTP browsing from iPhones that are connected to the corporate network. Learn More .
In This AdvisoryFebruary 8, 2011
Top Protections
Microsoft Patches Three Zero-Day Vulnerabilities
Zero-Day Information Disclosure Vulnerability in Microsoft MHTML Protocol Handler
Security Best Practice: Blocking iPhone Web Browsing on the Enterprise Wireless Network
Deployment Tip
Use Identity Logging to Show User and Machine Names in IPS Logs
Highlighted Protections
Including Patch Tuesday
Deployment Tip
Best Practice: Use Identity Logging to Show User and Machine Names in IPS Logs
One of the first steps after identifying a significant even on the network is to understand WHO did it and WHERE it came from. Introduced in R70.2, Identity Logging aids in analyzing network traffic and security-related events by identifying the specific user by name that initiated the traffic. (Previously, source traffic was identified only by its URL or IP address.) It works by extracting user and computer name information from Active Directory (AD) logs and inserting that information into the Check Point logs.
You can configure user and computer identification settings using SmartDashboard on any Security Management Server or log server object.
» Highlighted Protections
This table lists Check Point protections for recently disclosed threats. In some cases, Check Point protections against such threats or threat types have been available for some time, and the date listed is the date when the protection became available.
SeverityVulnerability DescriptionCheck Point Protection
IssuedIndustry ReferenceCheck Point Reference
NumberCritical
Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow
CVE-2010-397009-Jan-2011
MS11-006
CPAI-2011-003
Critical
Microsoft IIS FTP Server Telnet IAC Buffer Overflow
CVE-2010-397226-Dec-2010
MS11-004
CPAI-2010-351
Critical
Microsoft OpenType CFF Driver Font Encoded Character Corruption
CVE-2011-003308-Feb-2011
MS11-007
CPAI-2011-007
Critical
Microsoft Internet Explorer Insert Document Object Memory Corruption
CVE-2011-003608-Feb-2011
MS11-003
CPAI-2011-008
Critical
Microsoft Internet Explorer onCellChange Event Memory Corruption
CVE-2011-003508-Feb-2011
MS11-003
CPAI-2011-011
High
Microsoft Internet Explorer MHTML Information Disclosure
CVE-2011-009631-Jan-2010
Microsoft 2501696
CPAI-2011-006
High
Microsoft Internet Explorer CSS Recursive Import Memory Corruption
CVE-2010-397127-Dec-2010
MS11-003
CPAI-2010-349
High
Blocking Apple iPhone Browsing Application Control
IPS Research Center02-Feb-2011
SBP-2011-02
High
Microsoft Active Directory SPN Validation Denial of Service
CVE-2011-004008-Feb-2011
MS11-005
CPAI-2011-012
High
Microsoft Kerberos Implementation Spoofing Elevation of Privilege
CVE-2011-009108-Feb-2011
MS11-013
CPAI-2011-010
High
Opera Browser Document Writing Uninitialized Memory Access
CVE-2010-172831-Jan-2011
CPAI-2011-100
More Updates >
Have questions about IPS?
Participate in the IPS User Forum. The IPS Forum is your space for asking questions regarding all IPS features, and to collaborate with other IPS users, worldwide, on IPS related issues. Check Point employees may monitor the forum and provide information on the issues posted.
Know someone who should be getting the Advisories?
» About the Check Point Update Services
Check Point provides ongoing and real-time updates and configuration information to its NGX products through SmartDefense subscriptions, and to Check Point Software Blades products through an update service included with the relevant Software Blade subscriptions. These updates increase the value of your Check Point products and minimize threats by providing defenses that can be used before vendor patches are applied throughout your network. These defenses are developed and distributed by Check Point's global Research and Response Centers. For more information, visit www.CheckPoint.com.
Read Check Point's Privacy Policy
©2003-2011 Check Point Software Technologies Ltd. (Nasdaq: CHKP) All rights reserved. 800 Bridge Parkway, Redwood City, CA USA 94065
Bookmarks