|Check Point Reference:||CPAI-2013-082|
|Date Published:||12 Feb 2013|
|Last Updated:||19 Jul 2018|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in the way VML buffers are allocated. A remote attacker could trigger this vulnerability by enticing an unsuspecting victim to open a specially crafted web page. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.|
This protection will detect and block attempts to open a malicious HTML file.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Internet Explorer VML Objects Memory Corruption (MS13-009)