Sunday, December 21, 2014 Last update: 1:33 PM
FreshNews.com - Covering Large & Obscure Tech Companies Since 1996

Media Alert: Check Point Discovers Critical Vulnerability for Wikipedia.org and Other 'Wiki' Sites

Companies mentioned in this article: Check Point Software Technologies Ltd.

SAN CARLOS, CA -- (Marketwired) -- 01/29/14 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today released its findings of a critical vulnerability in the MediaWiki project Web platform, a popular open-source Web platform used to create and maintain 'wiki' Web sites. The MediaWiki platform includes Wikipedia.org, the sixth most visited Web site in the world(1) with over 94 million unique visitors per month.(2)

Check Point researchers discovered that this critical vulnerability left MediaWiki (version 1.8 onwards) exposed to remote code execution (RCE), where an attacker can gain complete control of the vulnerable web server. Check Point immediately alerted the WikiMedia Foundation about the vulnerability, and after verification, the Foundation issued an update and patch to the MediaWiki software. Check Point also delivered updated protections to its worldwide customers in conjunction with the WikiMedia Foundation's software update.

Key Findings:

  • If the vulnerability had not been uncovered, an attacker would have been able to control the Wikipedia.org Web server, or any other 'wiki' site running on MediaWiki, and potentially inject and serve malware-infecting code to users visiting these sites
  • The WikiMedia Foundation released a software update after learning of the vulnerability from Check Point and encouraged all MediaWiki customers to apply the patch as soon as possible
  • Since 2006, this is only the third RCE vulnerability found in the MediaWiki platform(3)

Check Point's Vulnerability Research Group regularly performs assessments of common software to ensure the security of Internet users worldwide. Customers with the Check Point Intrusion Prevention System (IPS) Software Blade automatically received detections for this vulnerability.

"It only takes a single vulnerability on a widely adopted platform for a hacker to infiltrate and wreak widespread damage. The Check Point Vulnerability Research Group focuses on finding these security exposures and deploying the necessary real-time protections to secure the Internet. We're pleased that the MediaWiki platform is now protected against attacks on this vulnerability, which would have posed great security risk for millions of daily 'wiki' site users," said Dorit Dor, vice president of products at Check Point Software Technologies.

For additional details, visit: http://www.checkpoint.com/threatcloud-central/index.html

Follow Check Point via

Twitter: www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

(1) According to Alexa, www.alexa.com/topsites
(2) According to Compete.com, http://siteanalytics.compete.com/wikipedia.org
(3) According to CVE Details, http://www.cvedetails.com/product/4125/Mediawiki-Mediawiki.html


Contact: