Check Point Reference: | CPAI-2011-228 |
Date Published: | 4 Apr 2011 |
Severity: | Critical |
Last Updated: | Tuesday 29 November, 2011 |
Source: | |
Industry Reference: | CVE-2011-0657 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Link-local Multicast Name Resolution (LLMNR) is a new protocol that provides an additional method to resolve the names of neighboring computers. It is especially useful for networks that do not have a DNS server. LLMNR uses a simple exchange of request and reply messages to resolve computer names to Internet Protocol version 6 (IPv6) or IP version 4 (IPv4) addresses. A remote code execution vulnerability has been discovered in the way that the DNS client service handles specially crafted LLMNR queries. The vulnerability is caused by the way that specially crafted LLMNR queries are handled by the DNS client. The reverse name-to-IP functionality in DNSAPI.DLL contains a flaw which leads to a stack buffer underrun. A remote attacker may exploit this issue via a specially crafted DNS LLMNR request. Successful exploitation of this vulnerability could resulte in code execution on the affected system. |
This protection will detect and block specially crafted DNS LLMNR requests sent to the vulnerable system.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: DNS Enforcement Violation.
Attack Information: Microsoft DNS resolution LLMNR query remote code execution (MS11-030)