Netop Remote Control DWS File Stack Buffer Overflow
|Check Point Reference:||CPAI-2012-381|
|Source:||Security Focus Advisory 47631|
|Protection Provided by:||
Who is Vulnerable?
Netop Remote Control 9.5 and prior
A buffer overflow vulnerability has been reported in Netop Remote Control.
The vulnerability is due to insufficient bounds checking when handling a specially crafted command string within a DWS file. A remote attacker can exploit this issue by enticing a target user to open a specially crafted DWS file. Successful exploitation would allow an attacker to execute arbitrary code.
This protection will detect and block the transferring of a crafted dws files to the target user.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the Netop Remote Control dws File Stack Buffer Overflow protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: Remote Administrator Enforcement Violation
Attack Information: Netop Remote Control dws File Stack Buffer Overflow