Security Hero Rotating Header Image

September, 2006:

Vulnerability in Vector Markup Language Could Allow Remote Code Execution – 9/26/2006

Microsoft Security Advisory (925568): Vulnerability in Vector Markup Language Could Allow Remote Code Execution – 9/26/2006

Revision Note: Advisory Updated Advisory Summary:Microsoft is investigating new public reports of vulnerability using the Vector Markup Language on Microsoft on Windows 2000 Service Pack 4, on Windows XP Service Pack 1 and Service Pack 2, Windows Server 2003 and Windows Server 2003 Service Pack 1.

URL: http://www.microsoft.com/technet/security/advisory/925568.mspx

Stration

Stration

This is a large family of email worms.

URL: http://www.norman.com/Virus/Virus_descriptions/38510

Leading Belgium Service Provider Brutélé Expands Network with Infoblox Appliances

Leading Belgium Service Provider Brutélé Expands Network with Infoblox Appliances

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that Brutélé, a leading supplier of cable television services to more than 300,000 households in Brussels and Wallonia, has selected and deployed Infoblox network identity appliances.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/9MZ6ulv8EDg/release.cfm

New Infoblox Network Services for VoIP Solution Dramatically Increases IP Phone System Reliability, Security and Manageability

New Infoblox Network Services for VoIP Solution Dramatically Increases IP Phone System Reliability, Security and Manageability

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced availability of the new Infoblox Network Services for VoIP package, which delivers highly reliable, secure, and easy-to-deploy IP address assignment and management (DHCP/IPAM), file transfer (TFTP/HTTP), and network time (NTP) services–all essential for the operation of an IP phone system.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/PmU65jZ63fE/release.cfm

Cisco VLAN Trunking Protocol Vulnerabilities

Cisco VLAN Trunking Protocol Vulnerabilities

This is a Cisco response to an advisory published by FX of Phenoelit posted as of September 13, 2006, at http://www.securityfocus.com/archive/1/445896/30/0/threaded and entitled “Cisco Systems IOS VTP multiple vulnerabilities”.

URL: http://www.cisco.com/en/US/products/hw/switches/ps5528/tsd_products_security_response09186a00807335bc.html

Infoblox Joins Trusted Computing Group and Contributes Expertise to Trusted Network Connect Architecture

Infoblox Joins Trusted Computing Group and Contributes Expertise to Trusted Network Connect Architecture

Representing its continued commitment to support open standards-based solutions, Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced it has joined the Trusted Computing Group (TCG) and supports the organization’s Trusted Network Connect (TNC) initiative.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/Y9UqSpwV97I/release.cfm

Leading Manufacturing & Trading Conglomerate in Thailand Keeps Its Network and Business Moving with Infoblox Appliances

Leading Manufacturing & Trading Conglomerate in Thailand Keeps Its Network and Business Moving with Infoblox Appliances

Infoblox Inc., a developer of essential infrastructure for identity-driven networks (IDNs), today announced that the Berli Jucker Public Company Ltd. (BJC), a leading wholesale manufacturing, trading and distribution conglomerate, has selected and deployed Infoblox network identity appliances.

URL: http://feedproxy.google.com/~r/InfobloxNewsFeed/~3/F5B7gzEU8AM/release.cfm

Update for Windows – 9/12/2006

Microsoft Security Advisory (922582): Update for Windows – 9/12/2006

Revision Note: Advisory published Advisory Summary:Today we are announcing the availability of an update that does not address a security vulnerability, but is a high priority for customers in keeping their systems updated. The update addresses the following issue: You may receive error code 0x80070002 when you try to update a computer running on Microsoft Windows that has a minifilter-based application installed. This error code could occur when updating using any of the following Microsoft tools: Automatic Updates, Windows Update Web site, Microsoft Update Web site, Inventory Tool for Microsoft Updates (ITMU) for Microsoft Systems Management Server (SMS) 2003, Software Update Services (SUS) 1.0, Windows Server Update Services (WSUS) 2.0. Currently, File Server Resource Manager (FSRM) is the only known minifilter-based application that can cause this behavior and is only available in Windows Server 2003 R2. However, many companies are developing minifilter-based applications that will be available in the near future. We encourage Windows customers to review and install this update. This update will be offered automatically through Automatic Updates. This update has been designed to install successfully even if a minifilter driver is installed that is preventing other updates from installing. For more information about this issue, including download links for the available non-security update, please review Microsoft Knowledge Base Article 922582.

URL: http://www.microsoft.com/technet/security/advisory/922582.mspx

Cisco IOS GRE Decapsulation Vulnerability

Cisco IOS GRE Decapsulation Vulnerability

This is a Cisco response to an advisory published by FX of Phenoelit posted as of September 06, 2006, at http://www.securityfocus.com/archive/1/445322/30/0/threaded, and entitled “Cisco Systems IOS GRE decapsulation fault”.

URL: http://www.cisco.com/en/US/products/products_security_response09186a008072cd7b.html