http://www.news.com/Investor/NewsItem/0,213,0~3~2~Computer%20Data%20Security~MEMCF~BLO~369703770~~~~~,00.html HURWITZ GROUP NAMES BUFFER OVERFLOW ATTACKS AS SIGNIFICANT THREAT Business Wire February 3, 1999, 9:25 a.m. PT t to Web Security; MEMCO's New SECURED for Internet Product Line Cited as Proactive Solution Business Editors/High Tech Writers REDWOOD CITY, Calif.--(BUSINESS WIRE)--Feb. 3, 1999--MEMCO Software, Inc. (Nasdaq: MEMCF), a leading provider of information security software, today announced the availability of a report issued by Hurwitz Group, a leading analyst firm specializing in strategic business applications, that explains the danger of buffer overflow attacks to Web security. [This comes over a year and a half AFTER Aleph One's paper titled "smashing the stack for fun and profit". Making a claim such as this is hardly new or groundbreaking.] The report describes traditional and new approaches to preventing this favorite hacker technique that is growing in popularity with the expansion of the Internet. MEMCO's recently announced SECURED for Internet, a new class of "Intrusion Prevention" products, is named in the report as proactively stopping the problem of buffer overflow attacks. [No partnership going on here. Hurwitz comes out with this incredibly belated report as MEMCO develops a "new" solution to the problem?] The Hurwitz Group report entitled "The Buffer Overflow Problem," explores how corporate Internet servers have now become the most important line of communication with customers, partners and investors. With this increased connectivity, however, comes the real threat of criminal activity and exploitation due to unavoidable security holes and an increased knowledge of vulnerabilities on the part of hackers. Concrete examples of this security threat include the recently publicized attacks on corporate Web sites including the New York Times, the CIA and the Department of Justice. [At the time of this article, no details have been released regarding how the New York Times was compromised, yet they know and call it 'concrete' proof?] The Hurwitz report describes MEMCO's new SECURED product line with its patent-pending Stack Overflow Protection (STOP), and proven Dynamic Security Extension (DSX) technologies, as a "proactive" approach to preventing security attacks against the root or administrator account via buffer overflow. A complete copy of the Hurwitz report is available at www.memco.com. [And for daemons that don't run as root or administrator? That means an attacker can still gain a user land shell. As for the "patent-pending" program, I sure hope there are no obvious 'coincidences' between STOP and Solar Designer's Linux Kernel mods that do the same thing.] "Buffer overflow will continue to be a security problem until all system vulnerabilities are revealed and solutions are put in place," said Steven Foote, senior vice president of Hurwitz Group Inc. "MEMCO offers a proactive solution that makes it significantly easier to protect Internet applications by locking down critical operating system and application resources, preventing both external and internal hacker attacks." "With this report on buffer overflow, Hurwitz Group has exposed a serious obstacle for companies looking to adopt Internet technology for e-commerce and business-to-business communication," said Eli Singer, president of MEMCO software. "With SECURED for Internet, we have been able to neutralize buffer overflow attacks and place control back in the hands of our customers, enabling safe e-business." ["Exposed a serious obstacle"?! This has been a known issue for over *five years*. Thanks to the folks like Aleph One, Mudge, and others.. it has been brought to public light.] MEMCO's new SECURED for Internet product line protects the content and availability of Web, email and firewall servers against hacker attacks. This product line features MEMCO's STOP technology. STOP is the only automated solution that protects against stack (or buffer) overflow attacks, a primary technique used by hackers to gain administrator authority and unrestricted access to server content and resources. With SECURED, companies are able to protect home pages from unauthorized modifications, prevent the hacking of Web scripts and Sendmail programs, and keep firewalls properly configured and running. [So one product can integrate seamlessly into any OS and any firewall, and stop ALL buffer overflow attacks? NT and Unix? POP, named, sendmail, finger, and more? Doubt it.]