Check Point Reference: | CPAI-2012-200 |
Date Published: | 8 May 2012 |
Severity: | Critical |
Last Updated: | Tuesday 08 May, 2012 |
Source: | |
Industry Reference: | CVE-2012-0162 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A remote code execution vulnerability has been reported in Microsoft .NET Framework. The vulnerability is caused due to an improper buffer allocation by Microsoft .NET Framework. A remote attacker can exploit this issue by enticing a target user to open a web-page that contains a specially crafted XAML browser application (XBAP). Successful exploitation of this vulnerability could allow an attacker to take complete control of an affected system. |
This protection will detect and block attempts to open a specially crafted web-page.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft .NET Framework XBAP buffer allocation code execution (MS12-035)