Check Point Advisories

IPS-1 Protection Updates for Vulnerabilities in Microsoft Windows and Asterisk and IPS-1 Protocol and Protocol Subsystems Updates

Check Point Reference: CPAI-2008-202
Date Published: 1 Feb 2008
Severity: High
Last Updated: Thursday 20 March, 2008
Source: Microsoft Security Bulletin MS06-032
VOIPSEC
Industry Reference:CVE-2006-2379
CVE-2007-1594
Protection Provided by:
Who is Vulnerable? Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier
Asterisk before 1.2.17 and 1.4.x before 1.4.2
Vulnerability Description A buffer overflow vulnerability in Microsoft Windows allows remote attackers to execute arbitrary code.
The handle_response function in Astersik allows allows remote attackers to cause a denial of service.
Vulnerability DetailsBuffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing.
The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
The following IPS-1 Protocols and Protocol Subsystems have been updated:
DNS (v29)
Distributed Denial of Service Agents (v14)
Finger (v11)
Fingerprint Protocol Subsystem (v10)
FTP (v24)
LPD/LPrng (v12)
MS-RPC (v33)
MS SQL (v20)
NNTP2 (v10)
Policy Settings (v23)
Rcommands (v11)
RPC (v23)
Scanner (v08)
Session Initiation Protocol (v10)
SNMP (v23)
SSH (v19)
SSL (v16)
Trojans and Remote Administration (v19)
WWW 2 (v31)

The following protocol groups have undergone documentation and configuration changes:
Distributed Denial of Service Agents
Finger
Fingerprint Protocol Subsystem
FTP
LPD/LPrng
MS-RPC
MS SQL
NNTP2
Rcommands
RPC
Scanner
SNMP
SSH
Trojans and Remote Administration
WWW 2

 

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK