Welcome!

Cloud Security Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

Internet Security Systems Delivers Preemptive Protection from Critical Microsoft Vulnerabilities

Internet Security Systems Delivers Preemptive Protection from Critical Microsoft Vulnerabilities

ATLANTA, Feb. 8 /PRNewswire-FirstCall/ -- Internet Security Systems (ISS) announced that it has preemptive protection available for all vulnerabilities announced by Microsoft today. Of these vulnerabilities, ISS' X-Force(R) research and development team considers two to be a serious threat to enterprise organizations. They are the License Logging Service (LLS) Vulnerability (MS 05-010) and the Server Message Block (SMB) Client Vulnerability (MS 05-011).

"Organizations using the affected Windows platforms should patch these high risk vulnerabilities immediately," said Abe Mounce, Director, X-Force Research and Development. "Successful exploitation of the SMB vulnerability or the LLS vulnerability can lead to the installation of malicious programs and even complete control over an affected system."

ISS products and managed services preemptively protect customers against all threats targeting these vulnerabilities. Those organizations without ISS protection should be aware of the following:

Business Impact:

If a user is logged on with administrator privileges, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system, including installing malicious programs such as malware; viewing, changing, or deleting confidential information; or further network compromise.

Affected Infrastructures:

The SMB protocol is used by Windows for sharing resources such as files and printers. The Windows SMB client contains multiple buffer overflow vulnerabilities, which can be triggered when an affected client queries an untrusted SMB server. Affected systems include Windows 2000 up to and including SP4, Windows XP up to and including SP2, and Windows Server 2003.

LLS is a Microsoft-specific service designed to manage and track licensing for large installations of Windows products. The service contains several buffer overflow vulnerabilities which might be leveraged by an attacker to gain control of an affected server. Affected systems include Windows NT4 and Windows 2000 Server.

Available Protection:

ISS preemptively shipped its customers network and server protection for these vulnerabilities on February 8, 2005. All other organizations should immediately install critical updates provided by Microsoft.

The full ISS X-Force alert can be found at: http://xforce.iss.net/xforce/alerts/id/186 or http://xforce.iss.net/xforce/bulletins/microsoft .

For more information on Internet Security Systems preemptive protection offerings, please visit: http://www.iss.net/proof/preemptiveprotection/

About Internet Security Systems, Inc.

Internet Security Systems is the trusted expert to global enterprises and world governments providing products and services that protect against Internet threats. An established world leader in security since 1994, ISS delivers proven cost efficiencies and reduces regulatory and business risk across the enterprise. ISS products and services are based on the proactive security intelligence conducted by ISS' X-Force(R) research and development team - the unequivocal world authority in vulnerability and threat research. Headquartered in Atlanta, Internet Security Systems has additional operations throughout the Americas, Asia, Australia, Europe and the Middle East. For more information, visit the Internet Security Systems Web site at http://www.iss.net/ or call 800-776-2362.

Internet Security Systems is a trademark and X-Force is a registered trademark of Internet Security Systems, Inc. All other companies and products mentioned are trademarks and property of their respective owner

Internet Security Systems, Inc.

CONTACT: Jeff Nessler, +1-404-236-3026, or [email protected] , or Kathryn
Quigley, +1-404-236-3691, or [email protected] , both of Internet Security
Systems

Web site: http://www.iss.net/
http://xforce.iss.net/xforce/alerts/id/186
http://xforce.iss.net/xforce/bulletins/microsoft
http://www.iss.net/proof/preemptiveprotection

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Where many organizations get into trouble, however, is that they try to have a broad and deep knowledge in each of these areas. This is a huge blow to an organization's productivity. By automating or outsourcing some of these pieces, such as databases, infrastructure, and networks, your team can instead focus on development, testing, and deployment. Further, organizations that focus their attention on these areas can eventually move to a test-driven development structure that condenses several l...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
Over the course of two days, in addition to insightful conversations and presentations delving into the industry's current pressing challenges, there was considerable buzz about digital transformation and how it is enabling global enterprises to accelerate business growth. Blockchain has been a term that people hear but don't quite understand. The most common myths about blockchain include the assumption that it is private, or that there is only one blockchain, and the idea that blockchain is...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...