Check Point Reference: | CPAI-2012-654 |
Date Published: | 28 Oct 2012 |
Severity: | N/A |
Last Updated: | Thursday 18 April, 2013 |
Source: | |
Industry Reference: | CVE-2012-4167 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability occurs when parsing specially crafted Flash video files. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted Flash video file. Successful exploitation can lead to arbitrary code execution. There are cases in which certain traffic, although not intended for malicious use, is very unsafe, since it may transfer shellcode which is undetectable by IPS. |
This protection will detect and block the transferring of F4V files over HTTP.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Adobe Products Violation.
Attack Information: multiple multimedia formats