Check Point Reference: | CPAI-2010-445 |
Date Published: | 8 Dec 2010 |
Severity: | High |
Last Updated: | Tuesday 24 November, 2015 |
Source: | |
Industry Reference: | CVE-2010-0112 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Symantec IM Manager is a software-based proxy to secure, manage, and log IM messages for enterprise and public IM protocols. It provides real-time threat protection against IM viruses, worms, and other types of attacks delivered through IM messages. Symantec IM Manager allows the definition of corporate policies and rules that must be followed by IM users. Among the supported features are: group policies, user registration, logon registration, logon restrictions, user authentication, internal routing, and reporting. A SQL injection vulnerability exists in Symantec IM Manager. Several pages do not require authentication, including IMAdminReportTrendFormRun.asp. This page does not perform sufficient input validation on the 'groupList' parameter allowing for SQL injection. A remote unauthenticated attacker can exploit this vulnerability by providing a specially crafted string to the groupList field. Successful exploitation will allow an attacker to execute SQL code on the IM Manager database. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Instant Messenger.
Attack Information: Symantec IM Manager IMAdminReportTrendFormRun.asp SQL injection