Secunia Security Advisory - Darren Bounds has reported a weakness in IronPort AsyncOS, which allows malware to bypass detection.
ca6f5f9fca7661ac7e9f183cafbfade7cd18d7bb88b6af557c2da505904ff7d1
TITLE:
Ironport AsyncOS RFC2397 Bypass Weakness
SECUNIA ADVISORY ID:
SA13848
VERIFY ADVISORY:
http://secunia.com/advisories/13848/
CRITICAL:
Not critical
IMPACT:
Security Bypass
WHERE:
>From remote
OPERATING SYSTEM:
IronPort AsyncOS
http://secunia.com/product/4514/
DESCRIPTION:
Darren Bounds has reported a weakness in IronPort AsyncOS, which
allows malware to bypass detection.
For more information:
SA13792
This has been reported to affect IronPort with Sophos AV - Engine
3.88 IDE Serial. Other versions may also be affected.
SOLUTION:
Do not rely solely on gateway / perimeter security.
Apply patches to fix vulnerabilities in client software and apply
other defence in depth measures.
PROVIDED AND/OR DISCOVERED BY:
Darren Bounds, Intrusense.
OTHER REFERENCES:
SA13792:
http://secunia.com/advisories/13792/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------