Mu Security Discovers Vulnerability
Mu Security has discovered and provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library
SUNNYVALE, Calif. -- Mu Security, a pioneer in the new security analyzer market, has discovered and subsequently provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library. See also: http://labs.musecurity.com/advisories.html.
In contrast to individual security researcher efforts, Mu Security Labs engineers use the Mu-4000 to apply scientific and metrics-based development efforts covering any IP product’s complete attack surface. This powerful methodology is demonstrated by Mu Security having published 13 significant vulnerabilities spanning a broad category of products and protocols. Any software or hardware vendor can now use this methodical approach to remove service availability weaknesses or security flaws before product shipments. Similarly, users including service providers are now evaluating the security profile of devices before purchase and deployment.
“As the editor of the SIP Torture Test, RFC-4475, I was particularly impressed with the Mu-4000 Security Analyzer at SIPIt, especially with respect to its dynamic ability to focus on meaningful tests that stress elements far beyond basic parsing mechanics,” said Robert Sparks SIPIt coordinator and vice president R&D, Estacado Systems. “I am suggesting new SIP analyses and tests for inclusion in Mu Security's platform.”
Security no longer is an issue handled only through defense in depth approaches, but instead as part of regular product development and deployment, and vendor evaluation, processes. This comprehensive, repeatable and automated approach ensures the industry’s most complete code coverage analysis for uncovering service availability and security weaknesses in any IP-based product.
Read more about:
2007About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024