Check Point Reference: | CPAI-2004-201 |
Date Published: | 23 Dec 2009 |
Severity: | High |
Last Updated: | Tuesday 20 December, 2016 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Microsoft Internet Explorer 5.0 Microsoft Internet Explorer 5.5 Microsoft Internet Explorer 6.0 |
Vulnerability Description | Microsoft Internet Explorer is a popular Web browser that supports image rendering within an HTML page. Internet Explorer also supports the saving of image resources to the local filesystem for offline viewing. A displayed image can be saved to local filesystem by selecting "Save Picture As" in the image's right-click context menu. A vulnerability exists in the way Microsoft Internet Explorer downloads and saves image files. A specially crafted filename can be made to appear to have an extension different from the one with which it is saved. This may allow a malicious user to entice the target user into saving potentially harmful files on the target system. The target system will not exhibit any unusual behavior during an attack attempt. The affected Microsoft Internet Explorer product will display a misleading filename in the the "Save As" dialog box. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft Internet Explorer image download spoofing