|Check Point Reference:||CPAI-2012-051|
|Date Published:||14 Feb 2012|
|Last Updated:||6 Feb 2018|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||A remote code execution vulnerability has been reported in Microsoft Color Control Panel. The vulnerability is due to the way the application improperly restricts the path used when loading external libraries. A remote attacker could exploit this issue by convincing a user to open a legitimate file (such as an .icm or .icc file) that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Successful exploitation could allow an attacker to take complete control of an affected system.|
This protection will detect and block the transferring of malicious DLL files over a network share.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Windows SMB Protection Violation.
Attack Information: Microsoft Color Control Panel Insecure Library Loading (MS12-012)