Check Point Reference: | CPAI-2010-289 |
Date Published: | 12 Oct 2010 |
Severity: | High |
Last Updated: | Monday 23 December, 2019 |
Source: | |
Industry Reference: | CVE-2010-3225 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A remote code execution vulnerability has been reported in Microsoft Windows Media Player network sharing service. The Network Service account is a built-in account that has more access to resources and objects than members of the Users group. Services that run as the Network Service account access network resources by using the credentials of the computer account. A remote attacker may exploit this vulnerability execute arbitrary code remotely in the context of the current application. The vulnerability is due to the way Microsoft Windows Media Network Sharing Service processes Real Time Streaming Protocol (RTSP) packets. A remote attacker could exploit this vulnerability by creating a specially crafted RTSP packet and sending it to an affected system. Successful exploitation may allow the attacker to take complete control of an affected system. |
This protection will detect and block the overly large requests made to the vulnerable service.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: Microsoft Windows Media Player RTSP Use after Free Code Execution (MS10-075)