SOURCE: Check Point Software Technologies Ltd.

August 04, 2009 00:53 ET

Media Alert: Check Point IPS Solutions Protect Windows and UNIX DNS Servers Against BIND Vulnerability

Check Point IPS Software Blade Provides Businesses With Immediate Protection Against Exploitation of ISC BIND 9 DNS Server Threat

REDWOOD CITY, CA--(Marketwire - August 4, 2009) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that Check Point IPS products protect customers against a newly discovered Berkeley Internet Name Domain (BIND) vulnerability. The exploit affects both commonly used UNIX and Windows based DNS servers and allows a remote attacker to create a denial-of-service condition.

The Berkeley Internet Name Domain (BIND) is a popular Domain Name System (DNS) implementation from Internet Systems Consortium (ISC). By sending a specially-crafted dynamic update packet to a BIND 9 server, a hacker can cause a denial of service by causing BIND to crash. The exploit is not limited to servers configured to allow dynamic updates. The vulnerability affects also all servers that are masters of one or more zones and slave servers that are configured to forward updates to their masters. Check Point integrated and dedicated IPS solutions protect against the threat by detecting and blocking maliciously crafted DNS packets. Additional information on the threat and Check Point's protections can be found at:

"BIND is an important building block of the Internet DNS system. Exploits using vulnerabilities in BIND can lead to down-time, phishing and other attacks," said Oded Gonda, vice president of network security products at Check Point. "Check Point IPS technologies are a critical security layer to traditional firewalls that will help an enterprise stay ahead of threats and vulnerabilities until servers or clients are patched."

Check Point's IPS Software Blade, IPS-1® appliances and SmartDefense® are supported by Check Point update services, which provides ongoing and real-time updates and configuration advisories for defenses and security policies. Check Point protections are developed and distributed by Check Point's Security Research and Response Centers located around the globe. Users of Check Point SmartDefense are also protected against the new vulnerability.

Based on the Software Blade architecture, Check Point IPS Software Blade provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, with preemptive threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. Software Blades are independent and flexible security modules that enable companies to select the functions they need to build a custom Check Point Security Gateway.

Businesses interested in additional information on Check Point IPS solutions can visit:

Businesses interested in subscribing to Check Point security update services can find more information at:

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (, worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2009 Check Point Software Technologies Ltd. All rights reserved.

Contact Information