Check Point Reference: | CPAI-2010-279 |
Date Published: | 12 Oct 2010 |
Severity: | High |
Last Updated: | Sunday 07 January, 2018 |
Source: | |
Industry Reference: | CVE-2010-3229 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Secure Channel (SChannel) security package is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. SChannel is part of the security package that helps provide an authentication service to provide secure communications between client and server. A denial of service vulnerability has been reported in the way that SChannel processes client certificates in implementations of Internet Information Services (IIS) on Microsoft Windows. The vulnerability is caused by SChannel failing to check a logical condition before processing a protocol request during an SSL/TLS handshake. A remote attacker may exploit this issue by sending a specially crafted packet message to an affected IIS server hosting an SSL web site, which could cause LSASS to stop responding and consequently result in a denial of service. |
This protection will detect and block malformed messages sent to the vulnerable server.Note, that in order for the defense to provide protection against this vulnerability, you will need to define any server you wish to apply the protection to as a Web server.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SSL Protection Violation.
Attack Information: Microsoft SChannel TLSv1 Denial of Service (MS10-085)