I ended the month of February with RSA, from a vendor point of view the show seemed to be bigger than last year; more vendors and it felt like there were more vendors with large scale booths than in previous years. I am sure that must say something about the economy - but I will leave it to others to make that distinction.
As always with the first month after a release February was full of calls with excited customers who wanted a deeper dive into some of the new features. You can read more about the new features here and if you are a customer or not I always enjoy taking people through Impact so feel free to email me (or your Core rep) and request a time to go through the new features in more detail.
Updates for February 2013 (excluding 11 maintenance updates)
Remote Code Execution
Novell eDirectory ndsd Remote Buffer Overflow Exploit
EMC AlphaStor Device Manager Command Injection Exploit
Enterasys NetSight nssyslogd PRI Buffer Overflow Exploit
Foxit Reader Firefox Plugin npFoxitReaderPlugin Buffer Overflow Exploit
Adobe Flash Player SWF Load Crafted Module Exploit
NTR ActiveX Control Check Method Buffer Overflow Exploit
Novell GroupWise gwcls1 ActiveX Malicious Pointer Exploit
Adobe Acrobat Reader acroform.api Exploit
Sparklabs Viscosity Python Exec Local Privilege Escalation Exploit
This month also saw the L3 team release five updates; as a reminder the L3 team is a quick response team for our customers. This team is responsible for delivering enhancements and tweaks as requested by our customers. In this month they have release the following additions or updates:
Get AntiVirus Product Name
Import Output from ACAS Nessus
Network Information Gathering and Vulnerability Scanner Wizards Importer Update
Import Output from Cenzic Update
Default Domain for DNS Communication Channel Update
Alex Horan, Senior Product Manager.