Business Wire
February 3, 1999, 9:25 a.m. PT

t to Web Security; MEMCO's New SECURED for
Internet Product Line Cited as Proactive Solution

Business Editors/High Tech Writers

REDWOOD CITY, Calif.--(BUSINESS WIRE)--Feb. 3, 1999--MEMCO Software, Inc.
(Nasdaq: MEMCF), a leading provider of information security software,
today announced the availability of a report issued by Hurwitz Group, a
leading analyst firm specializing in strategic business applications, that
explains the danger of buffer overflow attacks to Web security. 

[This comes over a year and a half AFTER Aleph One's paper titled
"smashing the stack for fun and profit". Making a claim such as this
is hardly new or groundbreaking.]

The report describes traditional and new approaches to preventing this
favorite hacker technique that is growing in popularity with the expansion
of the Internet. MEMCO's recently announced SECURED for Internet, a new
class of "Intrusion Prevention" products, is named in the report as
proactively stopping the problem of buffer overflow attacks. 

[No partnership going on here. Hurwitz comes out with this incredibly
belated report as MEMCO develops a "new" solution to the problem?]

The Hurwitz Group report entitled "The Buffer Overflow Problem,"  explores
how corporate Internet servers have now become the most important line of
communication with customers, partners and investors. With this increased
connectivity, however, comes the real threat of criminal activity and
exploitation due to unavoidable security holes and an increased knowledge
of vulnerabilities on the part of hackers. Concrete examples of this
security threat include the recently publicized attacks on corporate Web
sites including the New York Times, the CIA and the Department of Justice.

[At the time of this article, no details have been released regarding
how the New York Times was compromised, yet they know and call it
'concrete' proof?]

The Hurwitz report describes MEMCO's new SECURED product line with its
patent-pending Stack Overflow Protection (STOP), and proven Dynamic
Security Extension (DSX) technologies, as a "proactive" approach to
preventing security attacks against the root or administrator account via
buffer overflow. A complete copy of the Hurwitz report is available at 

[And for daemons that don't run as root or administrator?
That means an attacker can still gain a user land shell. As for the 
"patent-pending" program, I sure hope there are no obvious 'coincidences'
between STOP and Solar Designer's Linux Kernel mods that do the same

"Buffer overflow will continue to be a security problem until all system
vulnerabilities are revealed and solutions are put in place,"  said Steven
Foote, senior vice president of Hurwitz Group Inc. "MEMCO offers a
proactive solution that makes it significantly easier to protect Internet
applications by locking down critical operating system and application
resources, preventing both external and internal hacker attacks." 

"With this report on buffer overflow, Hurwitz Group has exposed a serious
obstacle for companies looking to adopt Internet technology for e-commerce
and business-to-business communication," said Eli Singer, president of
MEMCO software. "With SECURED for Internet, we have been able to
neutralize buffer overflow attacks and place control back in the hands of
our customers, enabling safe e-business." 

["Exposed a serious obstacle"?! This has been a known issue 
for over *five years*. Thanks to the folks like Aleph One, Mudge, and 
others.. it has been brought to public light.]

MEMCO's new SECURED for Internet product line protects the content and
availability of Web, email and firewall servers against hacker attacks.
This product line features MEMCO's STOP technology. 

STOP is the only automated solution that protects against stack (or
buffer) overflow attacks, a primary technique used by hackers to gain
administrator authority and unrestricted access to server content and
resources. With SECURED, companies are able to protect home pages from
unauthorized modifications, prevent the hacking of Web scripts and
Sendmail programs, and keep firewalls properly configured and running. 

[So one product can integrate seamlessly into any OS and
any firewall, and stop ALL buffer overflow attacks? NT and Unix? POP, 
named, sendmail, finger, and more? Doubt it.]