Check Point Advisories

Novell Client Print Provider Buffer Overflow (CVE-2006-6114)

Check Point Reference: CPAI-2006-279
Date Published: 28 Feb 2010
Severity: High
Last Updated: Tuesday 15 November, 2011
Source:
Industry Reference:CVE-2006-6114
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Microsoft Windows operating systems include a Print Spooler service, spoolsv.exe, which is started up with the system on most default installations. The print spooler service exports an Remote Procedure Call (RPC) interface to the server side of the spooler's Win32 API. A buffer overflow vulnerability exists in the Novell Client Print Provider module. The flaw may be exploited by sending a malicious request message to the Print Spooler RPC interface. Successful exploitation may allow an attacker to inject and execute arbitrary code on the target host with system-level privileges. In an attack case where code injection is not successful, the Print Spooler service, which loads the Novell Client Print Provider, will terminate abnormally, creating a denial of service to printing service. Other Windows services are not affected. Note that on Windows XP platforms, it is observed that after the denial of service attack, the Print Spooler service cannot be restarted successfully until after a system reboot. If a code execution attempt is carried out successfully, the behavior of the target host is dependent on the intention of the injected code. The injected code is executed with System level privileges

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Novell Client Print Provider Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  MS-RPC over CIFS Enforcement Violation.
Attack Information:  Novell client print provider buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK