Check Point Advisories

Symantec Alert Management System pagehndl.dll Stack Buffer Overflow (CVE-2010-0110)

Check Point Reference: CPAI-2011-021
Date Published: 20 Feb 2011
Severity: Critical
Last Updated: Sunday 20 February, 2011
Source:
Industry Reference:CVE-2010-0110
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Symantec Alert management System 2 (AMS2) is a package used by various Symantec solutions such as System Center, AntiVirus Server, and AntiVirus Central Quarantine Server. AMS2 starts multiple services on the system that run with System account privileges, by default. A stack buffer overflow vulnerability has been discovered in Symantec Alert Management System. The vulnerability occurs in the pagehndl.dll while processing data sent from the msgsys.exe process which listens by default on TCP port 38292. A remote attacker could exploit this issue by sending a specially crafted packet to the affected service. Successful exploitation could result in arbitrary code execution on the target system.

Protection Overview

This protection will detect and block malformed packets sent to the vulnerable service.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Symantec Alert Management System pagehndl.dll Stack Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Security Products Enforcement Violation.
Attack Information:  Symantec Alert Management System pagehndl.dll stack buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK