Check Point Reference: | CPAI-2014-0057 |
Date Published: | 7 Jan 2014 |
Severity: | Critical |
Last Updated: | Tuesday 07 January, 2014 |
Source: | |
Industry Reference: | CVE-2009-1350 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Novell NetIdentity agent works with eDirectory authentication to provide background authentication to Windows Web-based applications that require eDirectory authentication, such as iPrint, Novell Portal Services, eGuide, Novell NetIdentity, ZENworks, NetStorage, and iManager. NetIdentity provides a secure identity wallet on the workstation so that applications that require eDirectory authentication can access these credentials and bypass asking users for their usernames and passwords. A code execution vulnerability exists in Novell Client NetIdentity Agent. The flaw is due to insufficient sanity check when processing crafted RPC messages. An attacker could exploit this vulnerability by sending a specially crafted RPC message to the affected service. In an attack case where code injection is successful, the behavior of the target is entirely dependent on theintended function of the injected code. The injected code in such a case would execute within the security contextof the System user. In an attack case where code injection is not successful, the application might terminate abnormally creating a denial of service condition. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
SBP-2006-05,
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: HTTP Protocol Inspection.
Attack Information: Novell Client NetIdentity Agent Remote Pointer Dereference Code Execution - Ver2