Palo Alto Networks™, the leader in next-generation firewalls, today announced that its Threat Research Team has discovered two vulnerabilities in today’s Microsoft Patch Tuesday security bulletin. Both are critical vulnerabilities that can allow remote code execution if exploited. For both vulnerabilities, an attacker who successfully exploits them could take control of a susceptible system, install software, view/change/delete data, or create new user accounts with full user rights.

Microsoft credited Palo Alto Networks’ Threat Research Team with finding CVE-2009-1538 (DirectX Pointer Validation Vulnerability) and CVE-2009-1539 (DirectX Size Validation Vulnerability). Both CVE-2009-1538 and CVE-2009-1539 are vulnerabilities in Microsoft’s DirectX on Windows XP and Windows Server 2003.

The Palo Alto Networks Threat Research Team is active in the research community, aggressively pursuing both new vulnerability research and alleviation of all types of threats. They have leveraged their expertise to uncover a string of critical vulnerabilities and have then worked with Microsoft to make sure users are protected.

Enterprises using legacy security technology increasingly lack visibility into and control of application traffic. Palo Alto Networks’ next-generation firewalls are unique in the industry in their ability to see and control applications, users and content – not just ports, IP addresses and packets. Palo Alto Networks’ next-generation firewalls enable enterprises to create granular, business-relevant security policies and safely control applications instead of the block-or-nothing approach offered by traditional port-blocking firewalls.

About Palo Alto Networks

Palo Alto Networks™ is the leader in next-generation firewalls, enabling unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit www.paloaltonetworks.com.

 

###

Palo Alto Networks, the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.