Google Chrome and Apple Safari Runin Handling Use After Free (CVE-2011-3068)
|Check Point Reference:||CPAI-2012-387|
|Protection Provided by:||
Who is Vulnerable?
Google Chrome prior to 18.0.1025.151
Apple Computer Safari 5.x prior to 5.1.4
A remote code execution vulnerability has been reported in Apple Safari and Google Chrome.
The vulnerability is due to a use-after-free condition. A remote attacker can exploit this issue by enticing a target user to open a specially crafted HTML document. Successful exploitation would allow an attacker to execute arbitrary code with the security privileges of the logged-in user.
This protection will detect and block attempts to open a malicious HTML document.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the Google Chrome and Apple Safari Runin Handling Use After Free protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: Web Client Enforcement Violation
Attack Information: Google Chrome and Apple Safari Runin Handling Use After Free