Check Point Reference: | CPAI-2011-024 |
Date Published: | 13 Feb 2011 |
Severity: | Critical |
Last Updated: | Sunday 13 February, 2011 |
Source: | |
Industry Reference: | CVE-2010-0110 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Symantec Alert management System 2 (AMS2) is a package used by various Symantec solutions such as System Center, AntiVirus Server, and AntiVirus Central Quarantine Server. AMS2 starts multiple services on the system that run with System account privileges, by default. A stack buffer overflow vulnerability has been discovered in Symantec Alert Management System. The vulnerability is caused by code which copies a user supplied string into a stack buffer without proper bounds checks. The vulnerable code (contained in AMSLIB.dll) handles data sent to the msgsys.exe process which listens on port TCP/38292 by default. A remote attacker could exploit this issue by sending a specially crafted packet to the affected service. Successful exploitation could result in arbitrary code execution on the target system. |
This protection will detect and block malformed packets sent to the vulnerable service.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Security Products Enforcement Violation.
Attack Information: Symantec Alert Management System AMSSendAlertAck stack buffer overflow