Check Point Advisories

Symantec Alert Management System File Transfer Service Remote Code Execution (CVE-2009-1431)

Check Point Reference: CPAI-2009-087
Date Published: 20 May 2009
Severity: Critical
Last Updated: Wednesday 17 November, 2021
Source:
Industry Reference:CVE-2009-1431
Protection Provided by:

Security Gateway
R81, R80, R77, R75, R71, R70, R65

Who is Vulnerable?
Vulnerability Description Symantec System Center provides centralized systems and policy management for Norton Antivirus Enterprise Solution across multiple Windows NT and NetWare networks. The vulnerability is due to a design error in the Intel File Transfer service (XFR.EXE), a service used to aid communication between the core server and managed clients. The vulnerability is due to a design error in XFR.EXE while transferring files to AMS2. Successful exploitation could result in remote code execution.

Protection Overview

This protection will detect and block unauthenticated commands to the Intel File Transfer service.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R81 / R80 / R77 / R75 / R71 / R70 / R65

  1. In the IPS tab, click Protections and find the Symantec Alert Management System File Transfer Service Remote Code Execution protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Security Products Enforcement Violation.
Attack Information:  Symantec Alert Management System File Transfer Service Remote Code Execution

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK