|Check Point Reference:||CPAI-2013-1639|
|Date Published:||28 Mar 2013|
|Protection Provided by:||
|Who is Vulnerable?|| BigAntSoft BigAnt Server 2.97 SP7 and prior |
|Vulnerability Description||A stack buffer overflow vulnerability exists in BigAnt Server. The vulnerability is due to a boundary error when handling SCH and DUPF requests. Remote unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in arbitrary code injection and execution with the privileges of the target server. If exploitation is unsuccessful, the affected application will terminate abnormally.|
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Instant Messenger
Attack Information: BigAnt Server SCH Request Stack Buffer Overflow