Check Point Advisories

Microsoft Outlook Express Windows Address Book File Overflow (MS06-016) - Ver2 (CVE-2006-0014)

Check Point Reference: CPAI-2015-0352
Date Published: 26 Mar 2015
Severity: Medium
Last Updated: Thursday 26 March, 2015
Source:
Industry Reference:CVE-2006-0014
Protection Provided by:

Security Gateway
R77, R76, R75

Who is Vulnerable?
Vulnerability Description Microsoft Outlook Express (OE) is an email, newsgroup and address book management client application. The application includes a stand-alone component called Address Book that manages the address book entries. An Address Book can contain entries for individual contacts as well as group lists that bundle individual contacts together. A vulnerability has been discovered in the way Microsoft Outlook Express parses malformed Windows Address Book (.wab) files. An attacker may exploit this vulnerability by enticing a user to open a crafted address book file. A successful attack can lead to the injection and execution of arbitrary code within the security context of the target user. In an attack case where code injection is not successful, the vulnerable wab.exe application will terminate immediately. In a more sophisticated attack that results in successful code injection, the behavior of the target system is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.

For information on how to update IPS, go to

SBP-2006-05
,
Protection tab and select the version of your choice.

Security Gateway R77 / R76 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Microsoft Outlook Express Windows Address Book File Overflow (MS06-016) - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:

Attack Name:  Content Protection Violation.
Attack Information:  Microsoft Outlook Express Windows Address Book File Overflow (MS06-016) - Ver2

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK