Check Point Reference: | CPAI-2005-309 |
Date Published: | 15 Dec 2009 |
Severity: | High |
Last Updated: | Tuesday 15 December, 2009 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Anti-Virus (AV) scanner software is provided by numerous vendors to enable the detection of the transfer or existence of known malicious software. There are two main scanning strategies implemented by most AV scanners - on-demand and on-access scanning. On-demand scanning occurs when a user voluntarily requests a scan to be performed, either on specific files or the whole file system. The AV scanner is thus manually activated by the user. The second mode of operation, on-access scanning, occurs when the virus scanner automatically invokes itself to examine the computer's memory and file system each time these resources are accessed by a program. AntiVirus products from several vendors are affected by a virus scan bypass vulnerability. The vulnerability may allow an attacker to deliver a known virus to a target host while evading the virus scan. Exploitation of this flaw may cause the target host to compromise. The virus scan protection of the vulnerable AntiVirus products is evaded as a result of an attack. The targeted host will not experience any visible change in behavior as a result of this evasion. The malicious file will be saved on the target system and may aid in further attacks. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Security Products Enforcement Violation.
Attack Information: Multiple vendor AntiVirus extended ASCII filename scan bypass