Check Point Reference: | CPAI-2009-428 |
Date Published: | 2 Feb 2010 |
Severity: | High |
Last Updated: | Tuesday 02 February, 2010 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | IBM Installation Manager (IIM) is a software tool that helps to install, update, modify, and install packages. It helps to manage IBM applications or packages by providing tools to keep packages up to date, modify the packages, manage the licenses for those packages, and uninstall the packages from systems. Additionally, IIM helps to keep track of what has been installed, determine what is available for installation, and organize installation directories. IIM runs on Windows as well as Linux platforms. An argument injection vulnerability has been reported in IBM Installation Manager. The vulnerability is due to insufficient checks when parsing iim:// URIs that could allow execution of arbitrary remote programs. A remote attacker can exploit this vulnerability by enticing the target user to open a HTML file that contains a crafted iim:// URI, which could lead to execution of arbitrary programs on the target. In a successful attack the behavior of the target system is dependent on the malicious program. Any code executed by the attacker runs with the privileges of the logged in user. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: IBM Installation Manager iim URI handling code execution