SUNNYVALE, Calif. -- Mu Security, a pioneer in the new security analyzer market, has discovered and subsequently provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library. See also: http://labs.musecurity.com/advisories.html.
In contrast to individual security researcher efforts, Mu Security Labs engineers use the Mu-4000 to apply scientific and metrics-based development efforts covering any IP products complete attack surface. This powerful methodology is demonstrated by Mu Security having published 13 significant vulnerabilities spanning a broad category of products and protocols. Any software or hardware vendor can now use this methodical approach to remove service availability weaknesses or security flaws before product shipments. Similarly, users including service providers are now evaluating the security profile of devices before purchase and deployment.
As the editor of the SIP Torture Test, RFC-4475, I was particularly impressed with the Mu-4000 Security Analyzer at SIPIt, especially with respect to its dynamic ability to focus on meaningful tests that stress elements far beyond basic parsing mechanics, said Robert Sparks SIPIt coordinator and vice president R&D, Estacado Systems. I am suggesting new SIP analyses and tests for inclusion in Mu Security's platform.
Security no longer is an issue handled only through defense in depth approaches, but instead as part of regular product development and deployment, and vendor evaluation, processes. This comprehensive, repeatable and automated approach ensures the industrys most complete code coverage analysis for uncovering service availability and security weaknesses in any IP-based product.