Check Point Reference: | CPAI-2009-275 |
Date Published: | 13 Dec 2009 |
Severity: | High |
Last Updated: | Sunday 13 December, 2009 |
Source: | |
Industry Reference: | CVE-2004-0839 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Internet Explorer provides a number of ways to represent remote or local content. One of it's more powerful features is the Web folder view. The Web folder provides easy access to files located on a web server. A vulnerability exists in the way Internet Explorer uses the web folder view for a local resource. When a local resource is specified via the "shell:" scheme as a "folder" property for a web folder anchor, Internet Explorer allows dropping a file from a remote source onto the local folder without any warnings. This can be used to copy an arbitrary binary to the user's startup folder without the download warning dialog and executing the binary on the next logon. The vulnerable application will not exhibit any unusual behavior during or after a successful attack. A file will be copied from the Internet zone to the local file system without the system asking for confirmation from the user. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft Internet Explorer drag and drop elevation of privilege (MS04-038)