Check Point Reference: | CPAI-2010-446 |
Date Published: | 8 Dec 2010 |
Severity: | High |
Last Updated: | Wednesday 08 December, 2010 |
Source: | |
Industry Reference: | CVE-2010-0112 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Symantec IM Manager is a software-based proxy to secure, manage, and log IM messages for enterprise and public IM protocols. It provides real-time threat protection against IM viruses, worms, and other types of attacks delivered through IM messages. Symantec IM Manager allows the definition of corporate policies and rules that must be followed by IM users. Among the supported features are: group policies, user registration, logon registration, logon restrictions, user authentication, internal routing, and reporting. An SQL injection vulnerability exists in Symantec IM Manager. The vulnerability is due to an insufficient input validation of the parameters selclause, whereTrendTimeClause, TrendTypeForReport, whereProtocolClause, groupIDClause and groupClause. A remote non-privileged user can exploit this vulnerability by embedding malicious SQL code as part of the vulnerable parameter. Successful exploitation would result in disclosure of sensitive information, and modification or manipulation of the data in the underlying database. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Instant Messenger.
Attack Information: Symantec IM Manager rdpageimlogic.aspx multiple SQL injections