New coded exploits that take advantage of a widespread Microsoft Windows vulnerability have been posted online. By most reports, malicious scans to expose vulnerable systems are running rampant a week after government warnings regarding the flaw.
Security experts said the scans for the vulnerability -- which involves a flaw in the Remote Procedure Call (RPC) protocol that could allow malicious users to execute code remotely -- are continuing amid actual attacks.
Commitment to IT security in big business has never been stronger, with network and host intrusion detection systems (IDS) high on the shopping list, according to research.
A study of enterprise purchasing plans conducted by Meta Group indicated strong interest in such systems which, the analyst firm said, are becoming accepted as a necessary part of well-secured environments.
Other long-term plans were found to include centralised security information management consoles for many organisations.
Corporate governance is often spoken about in the industry and many "company policies" focus on this, but it is seldom enforced, which can easily lead to confidentiality leaks, most often via e-mail.
This is the view of Kevin Taskes, MD of CertifiedMail, a company that focuses on the secure delivery of confidential e-mail messages. “Thanks to the Electronic Communications and Transactions (ECT) Act and the King II Report on Corporate Governance, executives have to pay more attention to electronic communication like e-mail and how it is used,” says Taskes.
Given the wide-open nature of the Internet, which allows anyone with the will and a network sniffer to eavesdrop on communications, IT groups must extend the protection of corporate applications and data to end-users accessing them remotely. This means implementing a VPN solution, and there’s more than one way to do it.
The following products have a vulnerability that can allow a
user of the host system to start an arbitrary program with
VMware GSX Server 2.5.1 (for Linux systems) build 4968 and
earlier releases VMware Workstation 4.0 (for Linux systems)
and earlier releases
By manipulating the VMware GSX Server and VMware Workstation
environment variables, a program such as a shell session with
root privileges could be started when a virtual machine is
launched. The user would then have full access to the host.