Check Point Advisories

Non Compliant MS-SQL TCP

Check Point Reference: CPAI-2013-3553
Date Published: 12 May 2007
Severity: High
Last Updated: Thursday 21 November, 2024
Source:
Protection Provided by:

Security Gateway
R70

  • R71

  • Who is Vulnerable? MS SQL
    Vulnerability Description MSSQL protections use a TDS protocol parser. A parsing error can be an indication of malicious traffic.
    Vulnerability DetailsIf a parsing error occurs, other protections might not be able to run. Note that if you are using TLS/SSL negotiation over MSSQL ports, traffic might not be inspected.

    Protection Overview

    By enabling this protection, You can configure the action that the parser will take once a parser error occurs.

    In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, Protection tab and select the version of your choice.

    Security Gateway R75 / R71 / R70

    1. In the IPS tab, click Protections and find the Non Compliant MS-SQL TCP protection using the Search tool and Edit the protection's settings.
    2. Install policy on all modules.

    SmartView Tracker will log the following entries:
    Attack Name: Microsoft SQL Server Protection Violation
    Attack Information: Parsing Error - Cannot Recognize TDS Header

    ×
      Feedback
    This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
    OK