Check Point Reference: | CPAI-2012-164 |
Date Published: | 14 May 2012 |
Severity: | High |
Last Updated: | Thursday 21 November, 2024 |
Source: | CVE-2011-3210 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | OpenSSL Project OpenSSL 0.9.8 through 0.9.8s OpenSSL Project OpenSSL 1.0.0 through 1.0.0d |
Vulnerability Description | A use-after-free vulnerability has been reported in OpenSSL. |
Vulnerability Details | The vulnerability is due to an error in the way the server handles handshake requests arriving in a certain order. A remote attacker could exploit this vulnerability by sending a malicious handshake sequence to a target server. Successful exploitation could result in arbitrary code execution, in the context of the affected application. |
IPS will detect and block malicious handshake requests sent to the TLS/SSL server.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: OpenSSL Enforcement Violation
Attack Information: OpenSSL Handshake Requests ECDH Use-After-Free