Weve yet to see a scalable solution that detects the JPEG vulnerability for Microsoft and third-party applications alike. Below are suggestions for dealing with this vulnerability using tools that may already be on your network.
Use Microsofts new enterprise-ready detection tool (KB886988) to patch Windows operating system, Internet Explorer, .Net and Office implementations
Use in-depth GDI+ detection tools such as ISCs GDI Scan on fresh images of desktops and servers to get a base-line picture of third-party libraries installed throughout the network; contact third-party application vendors as needed to determine the extent of the vulnerability
Utilize vulnerability scanners to search active systems for vulnerable libraries as new signatures are released
Leverage distributed agents where possible Some patch management or security agents have the ability to find specific files and report version information to a central console
As always, keep anti-virus signatures up-to-date
Technical Analyst Andrew Garcia can be reached at firstname.lastname@example.org.
Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.