Check Point Reference: | CPAI-2005-237 |
Date Published: | 11 Mar 2010 |
Severity: | High |
Last Updated: | Monday 13 October, 2014 |
Source: | |
Industry Reference: | CVE-2005-1665 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | ASP.NET is a technology that provides a programming model and infrastructure for creating dynamic web applications. ASP.NET is part of the Microsoft .NET Framework. ASP.NET is deployed on Microsoft Internet Information Server, which treats files with the .aspx extension as ASP.NET files and passes these files to ASP.NET engine for further processing. It has been reported that Microsoft's ASP.NET is affected by an input sanitization vulnerability. The problem is triggered when the product parses crafted web session state information. Successfully exploiting the vulnerability can cause the target to consume large amounts of computing resources, resulting in degraded performance or a denial of service. Successfully exploiting the vulnerability can cause the target to consume large amounts of computing resources. This can result in degraded performance. A continuous attack may cause the target to use significant amount of CPU power, creating a denial of service condition. Note, that after the attack is halted the system will eventually return to normal operating status. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Server Enforcement Violation.
Attack Information: Microsoft ASP.NET ViewState Denial of Service