Skip navigation

Sourcefire Vulnerability Research Team Protects Users from Latest Microsoft Windows and SQL Server Vulnerabilities

Columbia, MD – July 8, 2008 – Open source innovator and SNORT® creator, Sourcefire, Inc. (Nasdaq: FIRE), a leader in Enterprise Threat Management, announced that the Sourcefire® Vulnerability Research Team (VRT) has delivered rules to protect Sourcefire customers and Snort users from the four Microsoft vulnerabilities disclosed today. These vulnerabilities impact Microsoft Windows and Microsoft SQL Server.

“As we enter the second half of 2008, attacks and vulnerabilities are only continuing to increase in number and magnitude,” said Matt Watchinski, Director of the Sourcefire Vulnerability Research Team. “Now more than ever, organizations need to take a proactive stance and partner with their security providers to plug holes, address weaknesses and stop the current onslaught of threats. Sourcefire takes the protection of our customers very seriously, and we continually work with them to ensure that their assets are protected from theft or unauthorized access.”

Following Microsoft’s disclosure earlier today, the Sourcefire VRT created, tested and delivered Snort rules designed to detect attacks targeting the Microsoft vulnerabilities listed below. These new rules are included in the latest Sourcefire Security Enhancement Update (SEU) released today.

− Microsoft Security Bulletin MS08-037 – Important vulnerabilities in the Windows Domain Name System (DNS) could allow spoofing. These vulnerabilities exist in both the DNS client and DNS server and could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker’s own systems.

− Microsoft Security Bulletin MS08-038 – Important vulnerability in Windows Explorer could allow remote code execution when a specially crafted saved-search file is opened and saved. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

− Microsoft Security Bulletin MS08-039 – Important vulnerabilities in Outlook Web Access (OWA) for Microsoft Exchange Server could allow an attacker who successfully exploited these vulnerabilities to gain access to an individual OWA client’s session data, allowing elevation of privilege. The attacker could then perform any action the user could perform from within the individual client’s OWA session.

− Microsoft Security Bulletin MS08-40 – Important Microsoft Windows and Microsoft SQL Server vulnerabilities could allow an attacker to run code and to take complete control of an affected system. An authenticated attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

About the Sourcefire VRT
The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activities, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

About Sourcefire Sourcefire, Inc. (Nasdaq: FIRE), Snort creator and open source innovator, is a world leader in Enterprise Threat Management (ETM) solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks with its 3D Approach – Discover, Determine, Defend – to securing real networks. This ETM approach equips customers with an efficient and effective layered security defense – protecting network assets before, during and after an attack. Through the years, Sourcefire has been consistently recognized for its innovation and industry leadership by customers, media and industry analysts alike – with more than 40 awards and accolades. Today, the names Sourcefire and founder Martin Roesch have grown synonymous with innovation and network security intelligence. For more information about Sourcefire, please visit http://www.sourcefire.com.

SOURCEFIRE®, SNORT®, the Sourcefire logo, the Snort and Pig logo, SECURITY FOR THE REAL WORLD™, SOURCEFIRE DEFENSE CENTER™, SOURCEFIRE 3D™, RNA™, DAEMONLOGGER™, CLAMAV™, SOURCEFIRE SOLUTIONS NETWORK™, and certain other trademarks and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries. Other company, product and service names may be trademarks or service marks of others.

Media Contact:
Paula Elliott
Managing Director
C8 Consulting Ltd
+44 (0) 118 9001132 /+44 (0) 7894 339645
paula@c8consulting.co.uk

Investor Contact:
Tania Almond
Investor Relations Officer
Sourcefire, Inc
+ 1 410 423 1919
Tania.almond@sourfire.com

This press release was distributed by ResponseSource Press Release Wire on behalf of C8 Consulting in the following categories: Consumer Technology, Personal Finance, Business & Finance, Computing & Telecoms, for more information visit http://pressreleasewire.responsesource.com/about.