Check Point Reference: | CPAI-2008-297 |
Date Published: | 3 Aug 2010 |
Severity: | High |
Last Updated: | Tuesday 13 October, 2015 |
Source: | |
Industry Reference: | CVE-2008-1437 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Malware Protection Engine provides the scanning, detection and cleaning capabilities for the antivirus and antispyware clients from Microsoft. The applications that use this engine for their operation are: There exists a vulnerability in Microsoft Malware Protection Engine, which can be exploited to cause denial of service. The vulnerability is due to insufficient validation of certain data values while parsing Portable Executable (PE) files compressed with PECompact. A remote attacker can exploit this vulnerability by sending a crafted PE file to the target, and potentially causing an access violation leading to a crash of the Malware Protection Engine. In a successful attack case, the affected service may terminate abnormally and cause a Denial of Service condition. In most products, the Microsoft Protection Engine service will restart automatically after a short delay (15 seconds in most cases). |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Microsoft Malware Protection Engine File Processing Denial of Service