Palo Alto Networks™, the network security company, today announced that its Threat Research Team has discovered a vulnerability in today's Microsoft Patch Tuesday security bulletin. Microsoft credited Palo Alto Networks' Threat Research Team with finding CVE-2010-2567 (RPC Memory Corruption Vulnerability), which is categorized as important. This is the sixth vulnerability that Microsoft has credited Palo Alto Networks with discovering in the past 12 months.

The vulnerability pertains to the Remote Procedure Call (RPC) client implementation, which allocates memory when parsing specially-crafted RPC responses. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system including installing programs; viewing, changing, or deleting data; or creating new accounts with full user rights.

The Palo Alto Networks Threat Research Team is active in the research community, aggressively pursuing both new vulnerability research and alleviation of all types of threats. They have leveraged their expertise to uncover a string of critical vulnerabilities and have then worked with Microsoft to make sure users are protected.

Enterprises using legacy security technology increasingly lack visibility into and control of application traffic. Palo Alto Networks' next-generation firewalls are unique in the industry in their ability to see and control applications, users and content – not just ports, IP addresses and packets. Palo Alto Networks' next-generation firewalls enable enterprises to create granular, business-relevant security policies and safely control applications instead of the block-or-nothing approach offered by traditional port-blocking firewalls.

About Palo Alto Networks

Palo Alto Networks™ is the network security company.  Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit www.paloaltonetworks.com.

Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.