Welcome!

Eclipse Authors: Pat Romanski, Elizabeth White, Liz McMillan, David H Deans, JP Morgenthal

Related Topics: Eclipse

Eclipse: Article

eEye Releases Temporary Software Patch to Protect Against Zero-Day Flaw

eEye Security Protects Users From Critical Vulnerabilities Without Need for Software Patches

ALISO VIEJO, CA -- (MARKET WIRE) -- 03/30/07 -- eEye Digital Security®, the leading developer of system security software and the foremost contributor to security research and innovation, today released a custom form of protection to immediately address a critical exploit circulating via a flaw in Microsoft's Windows Operating System (OS). The flaw would allow a remote attacker to take complete control of an infected system. Additionally, eEye confirmed that Blink®, the award-winning Internet client security solution, provides proactive protection against this flaw.

To proactively protect Windows users around the world, eEye has released a temporary patch that prevents the flaw from being exploited. For individuals and organizations interested in receiving eEye's temporary zero-day patch, a copy can be downloaded at http://research.eeye.com/html/alerts/zeroday/20070328.html.

"Almost a year ago to the day, we released one of the first third-party patches, proactively providing Windows users temporary protection against a serious zero-day vulnerability; we are doing it yet again," said Marc Maiffret, eEye's co-founder and chief hacking officer. "Unlike last year's JScript Vulnerability, there are no immediately effective means of mitigation for this zero-day vulnerability. As a result, we encourage all Windows users to take advantage of our free patch until other means of protection become available."

Alternatively, users may install Blink Personal Internet security or Blink Professional Unified Client Security, which also provide protection without the need for security patches. http://www.eeye.com/html/products/blink/personal/

This unspecified vulnerability exists within multiple versions of Microsoft Windows operating systems and allows for a remote attacker to execute arbitrary code under the context of the logged-in user. This vulnerability can be exploited by visiting a malicious web site or opening a malformed Microsoft Office document.

This zero-day vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials. The impact of this exploit can vary from the reported Trojan installation to full system compromise by coupling this attack with a privilege escalation vulnerability to acquire SYSTEM access, which would provide the attacker complete control over the compromised host.

The most potent attack method used by this vulnerability is conducted by embedding a malicious .ANI file within an HTML web page. Doing so allows the vulnerability to be exploited with minimal user interaction by simply coaxing a user to follow a hyperlink and visit a malicious web site. Other exploit vectors exist including Microsoft Office applications since they also rely on the same .ANI processing code, making email delivery also a potent threat by using Microsoft Office attachments.

About eEye Digital Security®

eEye Digital Security is a leading developer of system security software, and the foremost contributor to security research and innovation. eEye enables secure computing through world-renowned research and innovative technology, supplying some of the world's largest businesses with an integrated and research-driven vulnerability assessment, intrusion prevention, and client security solution. eEye's customers represent the largest deployments of vulnerability assessment and prevention technology in the private and public sectors. eEye protects the networks and digital assets of a growing network of more than 9,000 corporate and government deployments worldwide. Founded in 1998, eEye Digital Security is headquartered in Orange County, California. For more information, please visit www.eeye.com.

All trademarks contained within this press release are the sole property of their respective owners and are hereby acknowledged.

Add to DiggBookmark with del.icio.usAdd to Newsvine

Contacts:

Agency:
Victor Cruz
MediaPR
1.508.655.4397
email: Email Contact

Corporate, North America:
Stacy Newman
1.949.900.4131
email: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.