Check Point Reference: | CPAI-2013-1664 |
Date Published: | 15 Apr 2013 |
Severity: | High |
Last Updated: | Wednesday 08 January, 2025 |
Source: | CVE-2009-2524 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 |
Vulnerability Description | An elevation of privilege vulnerability has been discovered in the Microsoft Windows Local Security Authority Subsystem Service (LSASS). The vulnerability is due to the Windows NTLM implementation in LSASS improper handling of malformed packets during NTLM authentication. A remote attacker could create a specially crafted anonymous NTLM authentication request that would cause a crash in the server-side LSASS process and restart the computer. |
Update/Patch Avaliable | Apply patches from: MS09-059 |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: MS-RPC over CIFS Enforcement Violation
Attack Information: Microsoft LSASS Authentication Process Integer Overflow (MS09-059) - high confidence