Check Point Reference: | CPAI-2009-266 |
Date Published: | 26 Oct 2009 |
Severity: | High |
Last Updated: | Monday 26 October, 2009 |
Source: | |
Industry Reference: | CVE-2009-2497 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Microsoft .NET Framework is a software framework that includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. A remote code execution vulnerability exists in the Microsoft .NET Framework. An attacker could exploit this issue by constructing a specially crafted Web page that when viewed by a user, could allow the attacker to execute arbitrary code remotely. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Microsoft .NET framework arbitrary memory modification (MS09-061)