Check Point Reference: | CPAI-2007-315 |
Date Published: | 18 Apr 2013 |
Severity: | High |
Last Updated: | Thursday 18 April, 2013 |
Source: | |
Industry Reference: | CVE-2007-2931 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | MSN Messenger is an instant messaging application developed by Microsoft. It was renamed to Windows Live Messenger in recent releases. MSN Messenger provides communicating features such as voice conversations, video conference, files transferring and online games. There exists a buffer overflow vulnerability in Microsoft MSN Messenger application. The flaw is due to lack of boundary checks when processing MSN video data. A remote attacker can exploit this vulnerability by sending a specially crafted MSN video data packet to the connected vulnerable MSN client. Successful exploitation of this vulnerability can allow an attacker to inject and execute arbitrary code on the target host with the privileges of the current logged in user. In an attack case where code injection is not successful, the affected application will terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Instant Messenger.
Attack Information: Microsoft MSN Messenger and Windows Live Messenger Code Execution - improved performance