Sec/280
January 19, 2013
This is my report on why I believe that it is important to protect our Windows and Unix/Linux servers from known vulnerabilities. As I am sure you know, there are many different types of attacks on servers/network systems today. Throughout this report, I will illustrate a few of the more recently known/discovered vulnerabilities on both the Windows and Unix/Linus servers.
First, I will start with a Windows vulnerability and it’s solution. The, “Windows file parsing vulnerability” is vulnerability within the windows file handling component. This particular vulnerability was discovered in certain windows that allowed remote code execution. This vulnerability could be exploited by creating a file or folder that is located on a local system, network share, or downloaded from an external source. If the attacker is successful, then exploitation of this vulnerability could result in them gaining the same privileges as one of our users. Depending on the privileges associated with the user, this attacker could install programs, view, change, delete data, or they could even create new accounts with full user rights. To protect our company from this threat I recommend that we apply all properly tested patches to our system and applications, deploy network intrusion systems, educate our employees to not open or download any suspicious attachments from untrusted users, and discourage our employees to not visit any links from suspicious sites.
Secondly, I will inform you about a Unix/Linux vulnerability and the approaches that we can take to help prevent exploitation. A, “System call entry point” vulnerability is potentially very harmful because it allows an attacker to take over a web server and gives them full root access to it. It does this by using backdoors. The major problem with this particular vulnerability is that it seems to have been exploited at a much
References: No author. (Dec. 2012). Retrieved from: http://www.cvedetails.com/cve/CVE-2012-4774/ No author. (July, 2012). Retrieved from: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3301