Check Point Advisories

Novell Client NetIdentity Agent Remote Pointer Dereference Code Execution - Ver2 (CVE-2009-1350)

Check Point Reference: CPAI-2014-0057
Date Published: 7 Jan 2014
Severity: Critical
Last Updated: Tuesday 07 January, 2014
Source:
Industry Reference:CVE-2009-1350
Protection Provided by:

Security Gateway
R77, R76, R75

Who is Vulnerable?
Vulnerability Description The Novell NetIdentity agent works with eDirectory authentication to provide background authentication to Windows Web-based applications that require eDirectory authentication, such as iPrint, Novell Portal Services, eGuide, Novell NetIdentity, ZENworks, NetStorage, and iManager. NetIdentity provides a secure identity wallet on the workstation so that applications that require eDirectory authentication can access these credentials and bypass asking users for their usernames and passwords. A code execution vulnerability exists in Novell Client NetIdentity Agent. The flaw is due to insufficient sanity check when processing crafted RPC messages. An attacker could exploit this vulnerability by sending a specially crafted RPC message to the affected service. In an attack case where code injection is successful, the behavior of the target is entirely dependent on theintended function of the injected code. The injected code in such a case would execute within the security contextof the System user. In an attack case where code injection is not successful, the application might terminate abnormally creating a denial of service condition.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.

For information on how to update IPS, go to

SBP-2006-05
,
Protection tab and select the version of your choice.

Security Gateway R77 / R76 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Novell Client NetIdentity Agent Remote Pointer Dereference Code Execution - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:

Attack Name:  HTTP Protocol Inspection.
Attack Information:  Novell Client NetIdentity Agent Remote Pointer Dereference Code Execution - Ver2

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK