Check Point Reference: | CPAI-2007-275 |
Date Published: | 19 Oct 2009 |
Severity: | High |
Last Updated: | Monday 19 October, 2009 |
Source: | |
Industry Reference: | CVE-2007-1173 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Symantec Discovery is a network asset management and configuration suite. This product is deployed in enterprise network to collect information about network computers and devices for management purpose. The product employs numerous communication protocols to access network nodes. One of the communication method is called IP based communication method. A buffer overflow vulnerability exists in the Symantec Discovery XFERWAN Service. The vulnerability is due to boundary errors when parsing strings in received TCP packets. A remote unauthenticated attacker may leverage this vulnerability by sending a specially crafted TCP packet with an overly long string. Successful exploitation allows injection and execution of arbitrary code with SYSTEM privileges. In a simple attack case, the affected service process will terminate abnormally when the malicious message is processed. In a sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the SYSTEM level privileges. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Symantec Discovery XFERWAN service buffer overflow