Industry News

VigilantMinds Validates Microsoft Still Vulnerable

VigilantMinds Creates Intrusion Signature for Latest Microsoft Vulnerability PITTSBURGH, PA -- (MARKET WIRE) -- 11-10-2003 -- VigilantMinds Inc., a leader in information security solutions, has validated the latest claims regarding a new Microsoft Remote Procedure Call (RPC) vulnerability. The rumor of the existence of this latest RPC vulnerability emerged earlier this week on several security-related discussion forums. VigilantMinds has created an intrusion signature to detect attempts at exploitation of this new vulnerability. VigilantMinds has already deployed a detection signature to protect its customers and has provided this intrusion signature to the global security community.

VigilantMinds has demonstrated full denial of service (DoS) attacks and possible remote exploitation against hosts with fully patched and updated versions of MS Windows XP Professional, XP Home, and 2000 Workstation. Although it has not been verified at this time, other versions of Microsoft Windows are also suspected to be subject to this vulnerability. VigilantMinds has notified Microsoft and the appropriate government agencies.

The vulnerability is an extension of the recent Microsoft Windows RPC vulnerability discovered less than two months ago. The latest RPC vulnerability enables hackers and/or worms to completely disrupt or take control of computer systems.

"This latest Microsoft RPC vulnerability may become the most severe business security issue to date. The MS-Blaster worm was based upon the prior RPC vulnerability -- and Blaster did a lot of damage. The new RPC vulnerability opens the door for more worms like Blaster. And since many organizations have already applied vendor patches related to RPC, they may assume that they are not at risk," says Dave Keener, VigilantMinds Chief Security Officer. "This confusion would amplify the detrimental effects of a new worm."

VigilantMinds has created and posted publicly an intrusion detection signature that will detect network traffic patterns associated with this attack. VigilantMinds will continue to update the intrusion signature as more information becomes available.

No software patch is available from Microsoft at this time. As a temporary solution, VigilantMinds suggests firewall restrictions on all affected ports for any exposed systems. All external connectivity (including VPN and dial-in) should be firewalled for incoming RPC activity.

About VigilantMinds Inc.:

VigilantMinds is a national leader in "best-fit" managed security solutions and leading-edge security products. VigilantMinds provides real-time monitoring and response for all aspects of an enterprise's wired and wireless Information System security issues. VigilantMinds enables organizations to improve the speed, efficiency and effectiveness of their systems security, thereby reducing operational costs and mitigating digital risks. www.vigilantminds.com.

Dave Keener
Chief Security Officer
VigilantMinds Inc.
412.607.8192
dave.keener@vigilantminds.com

Monica McDermott
Director of Corporate Communications
VigilantMinds Inc.
412.901.9447
monica.mcdermott@vigilantminds.com


© 2001 WebScope