Security Hero Rotating Header Image

February, 2006:

Minnesota School District Establishes Nonstop DNS, DHCP and RADIUS Foundation for VoIP and Wireless Services with Infoblox Appliances

Minnesota School District Establishes Nonstop DNS, DHCP and RADIUS Foundation for VoIP and Wireless Services with Infoblox Appliances

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that the Lakeville Area School District, one of the most rapidly growing school districts with over 11,000 students in the suburban south metro area of Minnesota, has selected and deployed Infoblox appliances to improve the reliability and reduce the management complexity of its domain name resolution, IP address assignment and authentication services.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/8iu4UEpuNZ8/release.cfm

A COM Object (Msdds.dll) Could Cause Internet Explorer to Unexpectedly Exit – 2/21/2006

Microsoft Security Advisory (906267): A COM Object (Msdds.dll) Could Cause Internet Explorer to Unexpectedly Exit – 2/21/2006

Revision Note: Advisory updated to include additional mitigating factors. Msdds.dll file versions have also been revised: updated file version from 7.0.9446.0 to 7.0.9466.0 and added file version 7.0.9064.9143. Advisory Summary:Microsoft is investigating new public reports of a possible vulnerability in Internet Explorer. We are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time. Microsoft is aggressively investigating the public reports. The Microsoft DDS Library Shape Control (Msdds.dll) is a COM object that could, when called from a Web page displayed in Internet Explorer, cause Internet Explorer to unexpectedly exit. This condition could potentially allow remote code execution if a user visited a malicious Web site. This COM Object is not marked safe for scripting and is not intended for use in Internet explorer. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

URL: http://www.microsoft.com/technet/security/advisory/906267.mspx

Vulnerability in Internet Explorer Could Allow Remote Code Execution – 2/14/2006

Microsoft Security Advisory (913333): Vulnerability in Internet Explorer Could Allow Remote Code Execution – 2/14/2006

Revision Note: Advisory Published Advisory Summary:Microsoft is investigating new public reports of a vulnerability in older versions of Microsoft Internet Explorer. Based on our investigation, this vulnerability could allow an attacker to execute arbitrary code on the user’s system in the security context of the logged-on user. The attacker could do this by one or more of the following actions: By hosting a specially crafted Windows Metafile (WMF) image on a malicious Web site; By convincing a user to open a specially crafted e-mail attachment; By convincing a user to click on a link in an e-mail message that takes the user to a malicious Web site; or By sending a specially crafted e-mail message to Outlook Express users, which they view in the preview pane. Note This is not the same issue as the one addressed by Microsoft Security Bulletin MS06-001 (912919). The vulnerability exists in: Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 and Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Millennium. Microsoft has determined that an attacker who exploits this vulnerability would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker’s Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems. In an e-mail based attack, customers would have to click a link to the malicious Web site, preview a malicious e-mail message, or open an attachment that exploited the vulnerability. In both Web-based and e-mail based attacks, the code would execute in the security context of the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft will continue to investigate these reports and provide additional guid

URL: http://www.microsoft.com/technet/security/advisory/913333.mspx

Tokyo Electron Ltd. to Distribute Infoblox Solutions in Japan

Tokyo Electron Ltd. to Distribute Infoblox Solutions in Japan

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that it has signed Tokyo Electron Ltd. (TEL), a leading Japanese provider of security, networking and storage solutions, as a distribution partner.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/SyKiZwd66lE/release.cfm

TechTarget com School district cuts cost gains features after graduating to VoIP

TechTarget com School district cuts cost gains features after graduating to VoIP

Rateliff network administrator for the Lakeville School District in Minnesota was charged with rolling out a 600 000 VoIP system to the massive 10 000 student 1 500 staff member school system The district ultimately chose Infoblox appliances for its network identity infrastructure which includes integrated DNS and DHCP out of the box RADIUS authentication and robust and simple GUI and delegation capabilities

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/8WMCJGbH-6c/0,289142,sid66_gci1164429,00.html

Infoblox ID Aware DHCP Toolkit Provides Identity-Driven IP Address Services for Network Access Control (NAC) Solutions

Infoblox ID Aware DHCP Toolkit Provides Identity-Driven IP Address Services for Network Access Control (NAC) Solutions

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced availability of the Infoblox ID Aware DHCP Toolkit. The Toolkit provides a foundation for any network access control (NAC) solution by using user identity (user name and password) and endpoint state information (e.g., antivirus and operating system versions) to ensure that a valid IP address – the key to gaining network access – is granted only to authorized users and endpoint devices that meet an organization’s compliance policies.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/ACqd32KQRQ4/release.cfm