SAN CARLOS, CA — (Marketwired) — 09/25/14 — . (NASDAQ: CHKP), the worldwide leader in securing the internet, today announced that it has issued an IPS protection against the GNU Bourne Again Shell (Bash) –Shellshock– Vulnerability, securing the integrity of its customers– network data.
Check Point released an IPS update to block exploits from Shellshock this morning. For more information, see: – Check Point Response to CVE-2014-6271 Bash Code Injection and CVE-2014-7169.
“Check Point issued an IPS protection this morning to detect and block attempts to exploit the vulnerability. We recommend that all of our customers make the update immediately in order to secure their networks,” said Dorit Dor, vice president of product at Check Point Software Technologies. “Shellshock leaves many systems vulnerable to attack, with a global impact that reaches far beyond any other network vulnerability.”
The United States Computer Emergency Readiness Team (US-CERT) writes: “A critical vulnerability has been reported in the GNU Bourne Again Shell (Bash), the common command-line shell used in most Linux/UNIX operating systems and Apple–s Mac OS X. The flaw could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system.” (1)
“Check Point will continue to monitor and access the Shellshock vulnerability, and will issue additional protections for our worldwide partners and customers as needed,” concluded Dor.
(1) US-CERT Alert (TA14-268A), GNU Bourne Again Shell (Bash) –Shellshock– Vulnerability (CVE-2014-6271/7169),
Twitter:
Facebook:
YouTube:
Check Point Software Technologies Ltd. (), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point–s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
You must be logged in to post a comment Login