Check Point Reference: | CPAI-2013-014 |
Date Published: | 14 Jan 2013 |
Severity: | High |
Last Updated: | Monday 14 January, 2013 |
Source: | |
Industry Reference: | CVE-2009-0075 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A memory corruption vulnerability exists in the way Internet Explorer 7 handles reference counting of objects and function pointers. The vulnerability is due to incomplete memory deallocation upon the deletion of an object which has been cloned. A remote attacker can exploit this vulnerability by enticing the target user to view a malicious HTML file. |
The protection will block the transfer of malicious files attempting to exploit the vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft IE dangling function pointer memory corruption (MS09-002)