Check Point Reference: | SBP-2011-13 |
Date Published: | 13 Sep 2011 |
Severity: | Critical |
Last Updated: | Monday 19 May, 2014 |
Source: | |
Industry Reference: | CVE-2011-0029 CVE-2011-1980 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A remote code execution vulnerability exists in the way that certain products handle the loading of DLL files. Certain applications improperly restrict the path used for loading external libraries. A remote attacker could exploit this vulnerability by manipulating a user to open a legitimate file that is located in the same network directory as a specially crafted DLL file. Upon opening the legitimate file, the application may attempt to load the malicious DLL and execute any code it contains. Successful exploitation of this vulnerability will allow an attacker to take complete control of an affected system. |
This protection will detect and block the transferring of suspicious DLL files over CIFS and Webdav.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Windows SMB Protection Violation.
Attack Information: Multiple Products .DLL insecure library loading