SOURCE: Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd.

November 25, 2009 14:00 ET

Media Alert: Check Point IPS and Endpoint Security Solutions Preemptively Protect Businesses Against Latest Unpatched Microsoft Internet Explorer Vulnerability

Check Point IPS and Endpoint Security Solutions Secure Enterprise Networks From Zero-Day Exploits Identified in Internet Explorer 6 and 7

REDWOOD CITY, CA--(Marketwire - November 25, 2009) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced users of Check Point Security Gateway R70, VPN-1® R65, VPN-1 VSX R65, InterSpect®, IPS and Endpoint Security WebCheck products are protected against the zero-day vulnerability in Microsoft Internet Explorer (IE). Check Point customers are preemptively protected from the unpatched threat that if exploited causes the browser to crash and leave systems vulnerable.

Also known as "Summoner," the still unpatched vulnerability can occur when IE tries to access an object that has been deleted (or "summoned from the dead"). To trigger the issue, an attacker may create a malicious web page that will cause IE to exit unexpectedly, leaving a system vulnerable and allowing a hacker to execute arbitrary code on the targeted system. The flaw affects widely used IE6 and IE7 running on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 and on Microsoft Windows 2000 SPT4 systems.

Check Point IPS and Endpoint Security solutions detect and block HTML pages attempting to exploit this vulnerability. Customers using the IPS Software Blade in Security Gateway R70, VPN-1 R65, VPN-1 VSX R65, InterSpect, and Endpoint Security WebCheck solutions are preemptively protected and require no system updates to address the threat. At the time of this writing, there is no patch available from Microsoft. Check Point has provided preemptive protection against exploits that use this vulnerability since November of 2006.

Check Point IPS and Endpoint Security solutions provide intrusion prevention capabilities available on dedicated platforms or integrated into Check Point gateways and are continuously updated by Check Point's services. Check Point provides real-time updates and configuration advisories for defenses and security policies. Check Point protections are developed and distributed by Security Research and Response Centers located around the globe.

Based on the Software Blade architecture, Check Point IPS Software Blade provides complete in-line firewall intrusion prevention capabilities at multi-gigabit speeds, with preemptive threat coverage for clients, servers, OS from vulnerabilities, malware/worm infections, and more. Software Blades are independent and flexible security modules that enable companies to select the functions they need to build a custom Check Point Security Gateway. For additional information on Check Point IPS products, visit:

Check Point Endpoint Security WebCheck successfully protects against zero-day vulnerabilities, drive-by downloads and other Web-based threats from damaging end-users' PCs. WebCheck patent-pending virtualization technology redirects the Web attacks to a "sandbox" where it remains trapped and cannot harm the operating system. More information on Check Point WebCheck can be found at:

More information about the new vulnerability and Check Point protections can be found at:

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (, worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2009 Check Point Software Technologies Ltd. All rights reserved.

Contact Information