Check Point Reference: | CPAI-2012-347 |
Date Published: | 14 Aug 2012 |
Severity: | High |
Last Updated: | Wednesday 15 November, 2023 |
Source: | |
Industry Reference: | CVE-2012-1856 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Microsoft Commerce Server 2002 Service Pack 4 Microsoft Commerce Server 2007 Service Pack 2 Microsoft Commerce Server 2009 Microsoft Commerce Server 2009 R2 Microsoft Host Integration Server (HIS) 2004 Service Pack 1 Microsoft Office 2003 Service Pack 3 Microsoft Office 2007 Service Pack 2 Microsoft Office 2007 Service Pack 3 Microsoft Office 2010 for x86 (32-bit Systems) Service Pack 1 Microsoft Office 2003 Web Components Service Pack 3 Microsoft SQL Server 2000 Service Pack 4 Microsoft SQL Server 2000 Service Pack 4 Analysis Services Microsoft SQL Server 2005 Express Edition with Advanced Services Service Pack 4 Microsoft SQL Server 2005 Service Pack 4 Itanium Microsoft SQL Server 2005 Service Pack 4 64-bit (X64) Microsoft SQL Server 2005 Service Pack 4 x86 (32-bit) Microsoft SQL Server 2008 R2 Itanium Microsoft SQL Server 2008 R2 64-bit (X64) Microsoft SQL Server 2008 R2 x86 (32-bit) Microsoft SQL Server 2008 R2 Service Pack 1 Itanium Microsoft SQL Server 2008 R2 Service Pack 1 X64 (64-bit) Microsoft SQL Server 2008 R2 Service Pack 1 x86 (32-bit) Microsoft SQL Server 2008 R2 Service Pack 2 Itanium Microsoft SQL Server 2008 R2 Service Pack 2X64 (64-bit) Microsoft SQL Server 2008 R2 Service Pack 2 x86 (32-bit) Microsoft SQL Server 2008 Service Pack 2 Itanium Based System Microsoft SQL Server 2008 Service Pack 2 64-bit (X64) Microsoft SQL Server 2008 Service Pack 2 x86 (32-bit) Microsoft SQL Server 2008 Service Pack 3 Itanium Based System Microsoft SQL Server 2008 Service Pack 3 64-bit (X64) Microsoft SQL Server 2008 Service Pack 3 x86 (32-bit) Microsoft Visual Basic 6.0 Runtime Microsoft Visual FoxPro 8.0 Service Pack 1 Microsoft Visual FoxPro 9.0 Service Pack 2 |
Vulnerability Description | A remote code execution vulnerability exists in multiple Microsoft products. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. |
This protection will detect and block the vulnerable ActiveX Control.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Microsoft Multiple Products Remote Code Execution (CVE-2012-1856)