Third Brigade's Intrusion Prevention System Protects Unpatched Internet Explorer Vulnerabilities

Share Article

Third Brigade Deep Security protects hosts that use Internet Explorer to access malicious or compromised web sites.

Ottawa, ON and Reston, VA - March 26, 2006 -- Third Brigade, Inc. (http://www.thirdbrigade.com) today announced that customers that have deployed Third Brigade Deep Security, its advanced Intrusion Prevention System (IPS), are proactively protected from attacks that could exploit vulnerabilities recently disclosed in Microsoft Internet Explorer. CNET and eWeek have reported that attackers are using hijacked Web servers and compromised sites to launch zero-day attacks that exploit one of these vulnerabilities, the Microsoft Internet Explorer CreateTextRange Remote Code Execution Vulnerability, CVE-2006-1359.

Third Brigade Deep Security protects hosts that use Internet Explorer to access malicious or compromised web sites. In addition, Third Brigade Deep Security can be used on web servers to prevent them from sending malicious content, which could affect users that access their site using Internet Explorer.

“A computer used to access a malicious or compromised site could then compromise sensitive hosts within the organization,” said Brian O'Higgins, CTO of Third Brigade, Inc. “Host-based intrusion prevention is the only way organizations can thoroughly protect themselves from this type of vulnerability.”

Third Brigade's advanced, host-based intrusion prevention system provides effective, proactive protection for a wide range of vulnerabilities that exist in commercial and custom software applications. Third Brigade customers automatically receive vulnerability shield updates with the latest filters that protect recently disclosed vulnerabilities, including these Internet Explorer vulnerabilities.

Third Brigade Deep Security proactively stops attacks before they impact hosts, helps ensure compliance with industry regulations such as PCI (including Visa CISP, Mastercard SDP), Sarbanes-Oxley, HIPAA, GLBA, FISMA and corporate policies, reduces operating costs, and prevents service disruptions caused by attacks.

For Third Brigade security dispatches on this security bulletin, click here:

http://www.thirdbrigade.com/security/dispatches.html

For more information on the Microsoft Internet Explorer vulnerabilities security bulletin, click here:

Microsoft Internet Explorer CreateTextRange Remote Code Execution Vulnerability

http://www.microsoft.com/technet/security/advisory/917077.mspx

Microsoft Internet Explorer JavaScript Event Handler Memory Overwrite

http://www.securitytrap.org/vulnwatch/558

For information on Third Brigade Deep Security, click here: http://www.thirdbrigade.com/products/index.html

About Third Brigade

Third Brigade specializes in providing intrusion prevention systems (IPS) to health care, government, telecommunications, financial services and other organizations that need to prevent attacks that exploit vulnerabilities in commercial and custom software, including web applications. It enables you to create and enforce comprehensive security policies that proactively protect critical applications, sensitive data, and hosts, ensure regulatory compliance, and maximize the performance of your people, processes and hosts. Unlike other intrusion prevention systems, Third Brigade’s is not intrusive. It has been architected from the ground-up for intrusion prevention, and is smaller, faster and simpler. Third Brigade. That’s control.

For media and analyst inquiries only, contact:

Kathryn Schwab

Media and Analyst Relations

Third Brigade, Inc.

(T) 613-599-4505 x2238 (NEW)

(M) 613-858-4407

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kathryn Schwab
Visit website