Check Point Reference: | CPAI-2011-602 |
Date Published: | 30 Dec 2011 |
Severity: | High |
Last Updated: | Sunday 05 October, 2014 |
Source: | |
Industry Reference: | CVE-2011-3415 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A spoofing vulnerability has been reported in Microsoft .NET Framework. The vulnerability is due to an error in the way .NET Framework verifies return URLs during the forms authentication process. A remote attacker may exploit this vulnerability by enticing users to open a malicious link. Successful exploitation would allow an attacker to redirect users to a website of the attacker's choosing. The attacker may then perform a phishing attack to gain information that was not meant to be disclosed. |
IPS will detect and block malicious URLs.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Server Enforcement Violation.
Attack Information: Microsoft .Net Form Authentication insecure redirect (MS11-100)