Check Point Reference: | CPAI-2011-502 |
Date Published: | 1 Nov 2011 |
Severity: | Medium |
Last Updated: | Monday 09 September, 2013 |
Source: | |
Industry Reference: | CVE-2011-2217 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A code execution vulnerability has been reported in Tom Sawyer. The vulnerability is due to an error while instantiating the ActiveX control in a browser. A remote attacker may exploit this vulnerability by enticing a user to open a specially crafted web-page. Successful exploitation of this vulnerability will allow an attacker to execute arbitrary code in the security context of the logged in user. |
This protection will detect and block attempts to open a malicious web-page.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Tom Sawyer GET extension factory COM object instantiation memory corruption