Check Point Advisories

Symantec Alert Management System AMSSendAlertAck Stack Buffer Overflow (CVE-2010-0110)

Check Point Reference: CPAI-2011-024
Date Published: 13 Feb 2011
Severity: Critical
Last Updated: Sunday 13 February, 2011
Source:
Industry Reference:CVE-2010-0110
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Symantec Alert management System 2 (AMS2) is a package used by various Symantec solutions such as System Center, AntiVirus Server, and AntiVirus Central Quarantine Server. AMS2 starts multiple services on the system that run with System account privileges, by default. A stack buffer overflow vulnerability has been discovered in Symantec Alert Management System. The vulnerability is caused by code which copies a user supplied string into a stack buffer without proper bounds checks. The vulnerable code (contained in AMSLIB.dll) handles data sent to the msgsys.exe process which listens on port TCP/38292 by default. A remote attacker could exploit this issue by sending a specially crafted packet to the affected service. Successful exploitation could result in arbitrary code execution on the target system.

Protection Overview

This protection will detect and block malformed packets sent to the vulnerable service.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Symantec Alert Management System AMSSendAlertAck Stack Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Security Products Enforcement Violation.
Attack Information:  Symantec Alert Management System AMSSendAlertAck stack buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK