Check Point Reference: | CPAI-2011-009 |
Date Published: | 8 Feb 2011 |
Severity: | Critical |
Last Updated: | Tuesday 08 February, 2011 |
Source: | |
Industry Reference: | CVE-2011-0031 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | An information disclosure vulnerability has been discovered in JScript and VBScript scripting engines. VBScript stands for Microsoft Visual Basic Scripting Edition that includes Web client scripting in Microsoft Internet Explorer and Web server scripting in Microsoft Internet Information Service. JScript is the Microsoft implementation of the ECMA 262 language specification (ECMAScript Edition 3). A remote attacker can exploit this issue to read data not intended to be disclosed. The vulnerability is due to the way that the JScript and VBScript scripting engines process scripts in Web pages. When these scripting engine attempts to load the decoded script into memory in order to run it, a memory corruption can occur. To trigger this issue, an attacker could host a specially crafted Web site that is designed to exploit this vulnerability and then convince a user to visit this Web site. Successful exploitation of this vulnerability will allow the attacker to read data which was not intended to be disclosed. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: JScript and VBScript scripting engines information disclosure (MS11-009)