Check Point Reference: | CPAI-2010-040 |
Date Published: | 1 Mar 2010 |
Severity: | Critical |
Last Updated: | Monday 15 August, 2016 |
Source: | |
Industry Reference: | CVE-2010-0242 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | TCP/IP SACK is used for connections with large TCP window sizes. When SACK is enabled, if a packet or series of packets is dropped the receiver can inform the sender of exactly which data has been received and where the holes in the data are. The sender can then selectively retransmit the missing data without needing to retransmit blocks of data that have already been received successfully. A denial of service vulnerability has been reported in Microsoft Windows TCP/IP stack Selective acknowledgment (SACK) processing. The vulnerability is due to insufficient bounds checking by the Windows TCP/IP stack when handling incoming Selective Acknowledgement packets. A remote attacker may trigger this vulnerability by sending specially crafted packets to the affected host. Successful exploitation of this issue could cause the affected system to stop accepting requests. |
This protection will detect and block TCP packets with malformed SACK options.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: TCP Enforcement Violation.
Attack Information: Microsoft TCP IP selective acknowledgement denial of service (MS10-009)