|Check Point Reference:||CPAI-2007-032|
|Date Published:||14 Feb 2007|
|Last Updated:||6 Oct 2013|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||ADODB.Connection ActiveX control is provided as part of the ActiveX Data Objects (ADO) and distributed in the Microsoft Data Access Components (MDAC). Microsoft ActiveX Data Objects (ADO) is a set of component object model for accessing data sources.Microsoft Internet Explorer is vulnerable to remote code execution. The vulnerability is due to a memory corruption error in the ADODB.Connection ActiveX Control. The flaw occurs when processing specially crafted arguments. To trigger the vulnerability, an attacker can create a malicious Web page that initiates the ActiveX control with a specially crafted argument. Successful exploitation could create a denial of service condition (causing Microsoft Internet Explorer to crash) and could result in remote code execution on the target system once the malicious page is loaded.|
This protection will detect and block the vulnerable ActiveX Control application.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft Data Access ADODB.Connection object memory corruption (MS07-009)